<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article
  PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "https://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.1" specific-use="sps-1.9" xml:lang="en" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">iei</journal-id>
			<journal-title-group>
				<journal-title>Ingeniería e Investigación</journal-title>
				<abbrev-journal-title abbrev-type="publisher">Ing. Investig.</abbrev-journal-title>
			</journal-title-group>
			<issn pub-type="ppub">0120-5609</issn>
			<publisher>
				<publisher-name>Facultad de Ingeniería, Universidad Nacional de Colombia.</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="doi">10.15446/ing.investig.97363</article-id>
			<article-id pub-id-type="other">214</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Original articles</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>A Survey of Virtualization Technologies: Towards a New Taxonomic Proposal</article-title>
				<trans-title-group xml:lang="es">
					<trans-title>Una revisión de las tecnologías de virtualización: hacia una nueva propuesta taxonómica</trans-title>
				</trans-title-group>
			</title-group>
			<contrib-group>
				<contrib contrib-type="author">
					<contrib-id contrib-id-type="orcid">0000-0003-2446-0602</contrib-id>
					<name>
						<surname>Sepúlveda-Rodríguez</surname>
						<given-names>Luis E.</given-names>
					</name>
					<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
				</contrib>
				<contrib contrib-type="author">
					<contrib-id contrib-id-type="orcid">0000-0001-8876-8855</contrib-id>
					<name>
						<surname>Chavarro-Porras</surname>
						<given-names>Julio С.</given-names>
					</name>
					<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
				</contrib>
				<contrib contrib-type="author">
					<contrib-id contrib-id-type="orcid">0000-0003-1381-5682</contrib-id>
					<name>
						<surname>Sanabria-Ordonez</surname>
						<given-names>John A.</given-names>
					</name>
					<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
				</contrib>
				<contrib contrib-type="author">
					<contrib-id contrib-id-type="orcid">0000-0002-7586-9419</contrib-id>
					<name>
						<surname>Castro</surname>
						<given-names>Harold E.</given-names>
					</name>
					<xref ref-type="aff" rid="aff4"><sup>4</sup></xref>
				</contrib>
				<contrib contrib-type="author">
					<contrib-id contrib-id-type="orcid">0000-0001-5955-0996</contrib-id>
					<name>
						<surname>Matthews</surname>
						<given-names>Jeanna</given-names>
					</name>
					<xref ref-type="aff" rid="aff5"><sup>5</sup></xref>
				</contrib>
			</contrib-group>
			<aff id="aff1">
				<label>1</label>
				<institution content-type="original">Systems and computing engineer. MSc in Open Software. Affiliation: PhD student in Engineering with emphasis on Computer Science, Universidad Tecnológica de Pereira, Pereira, Colombia. Professor at Universidad del Quindío. Armenia, Colombia. Email: lesepulveda@uniquindio.edu.co</institution>
				<institution content-type="normalized">Universidad del Quindío</institution>
				<institution content-type="orgname">Universidad del Quindío</institution>
				<addr-line>
					<city>Armenia</city>
				</addr-line>
				<country country="CO">Colombia</country>
				<email>lesepulveda@uniquindio.edu.co</email>
			</aff>
			<aff id="aff2">
				<label>2</label>
				<institution content-type="original">Systems engineer. PhD in Engineering, Universidad del Valle, Cali, Colombia. Affiliation: Universidad Tecnológica de Pereira, Colombia. Email: jchavar@utp.edu.co</institution>
				<institution content-type="normalized">Universidad Tecnológica de Pereira</institution>
				<institution content-type="orgname">Universidad Tecnológica de Pereira</institution>
				<country country="CO">Colombia</country>
				<email>jchavar@utp.edu.co</email>
			</aff>
			<aff id="aff3">
				<label>3</label>
				<institution content-type="original">Systems engineer. PhD in Computer Information Science and Engineering, Universidad de Puerto Rico. Affiliation: Universidad del Valle, Cali, Colombia. Email: john.sanabria@correounivalle.edu.co</institution>
				<institution content-type="normalized">Universidad del Valle</institution>
				<institution content-type="orgname">Universidad del Valle</institution>
				<addr-line>
					<city>Cali</city>
				</addr-line>
				<country country="CO">Colombia</country>
				<email>john.sanabria@correounivalle.edu.co</email>
			</aff>
			<aff id="aff4">
				<label>4</label>
				<institution content-type="original">Systems and computing engineer. PhD in Computer Science, Institut National Polytechnique de Grenoble (INPG), Grenoble, France. Affiliation: Computing and Systems Engineering Department, Universidad de los Andes, Bogotá, Colombia. Email: hcastro@uniandes.edu.co</institution>
				<institution content-type="normalized">Universidad de los Andes</institution>
				<institution content-type="orgname">Universidad de los Andes</institution>
				<addr-line>
					<city>Bogotá</city>
				</addr-line>
				<country country="CO">Colombia</country>
				<email>hcastro@uniandes.edu.co</email>
			</aff>
			<aff id="aff5">
				<label>5</label>
				<institution content-type="original">Mathematics and Computer Science, BS PhD in Computer Science, University of California, Berkeley, CA, USA. Affiliation: Department of Computer Science, Clarkson University, Potsdam, NY, USA. Email: jnm@clarkson.edu</institution>
				<institution content-type="normalized">University of California</institution>
				<institution content-type="orgname">University of California</institution>
				<addr-line>
					<city>Berkeley</city>
				</addr-line>
				<country country="US">USA</country>
				<email>jnm@clarkson.edu</email>
			</aff>
			<pub-date date-type="pub" publication-format="electronic">
				<day>01</day>
				<month>11</month>
				<year>2022</year>
			</pub-date>
			<pub-date date-type="collection" publication-format="electronic">
				<season>Sep-Dec</season>
				<year>2022</year>
			</pub-date>
			<volume>42</volume>
			<issue>3</issue>
			<elocation-id>e214</elocation-id>
			<history>
				<date date-type="received">
					<day>20</day>
					<month>07</month>
					<year>2021</year>
				</date>
				<date date-type="accepted">
					<day>09</day>
					<month>06</month>
					<year>2022</year>
				</date>
			</history>
			<permissions>
				<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/" xml:lang="en">
					<license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution License</license-p>
				</license>
			</permissions>
			<abstract>
				<title>ABSTRACT</title>
				<p>At present, there is a proliferation of virtualization technologies (VTs), which are part of the basic and underlying infrastructure of popular cloud computing. Those interested in VTs are faced with a non-unified volume of information and various approaches to modes of operation, classification structures, and the performance implications of these technologies. This makes it difficult to decide which type of VT is appropriate for a particular context. Therefore, this paper reviews the state of the art on VT taxonomic models. Methodologically, a literature review is carried out to identify VT classification models, recognizing their features and weaknesses. With this in mind, a new taxonomy of virtualization technologies is proposed, which responds to the weaknesses identified in the analyzed schemes. The new VT taxonomy combines the Abstraction Level and Virtual Machine Type approaches, providing the reader with a means to visualize VTs. In doing so, the reader can locate the level of abstraction at which each VT is developed, in addition to the type of machine projected, whether it is a complete system or an execution environment for processes. The proposed taxonomy can be used in the academic environment to facilitate teaching processes or in the business environment to facilitate decision-making when implementing VTs.</p>
			</abstract>
			<trans-abstract xml:lang="es">
				<title>RESUMEN</title>
				<p>En la actualidad existe una proliferación de tecnologías de virtualización (VTs), las cuales constituyen una parte de la infraestructura fundamental y subyacente al tan popular cloud computing. Los interesados en las VTs se enfrentan a un volumen de información no unificada y con enfoques diversos acerca de los modos de operación, estructuras de clasificación e implicaciones del desempeho de estas tecnologías. Esto hace difícil decidir sobre el tipo de VT adecuado para un contexto particular. Por lo anterior, este trabajo realiza una revisión del estado del arte acerca de los modelos taxonómicos de las VTs. Metodológicamente, se realiza una revisión de la literatura para identificar modelos de clasificación de las VTs, reconociendo sus características y debilidades. Considerando lo anterior, se propone una nueva taxonomía de las tecnologías de virtualización, que responde a las debilidades identificadas en los esquemas analizados. La nueva taxonomía de VTs combina los enfoques de Nivel de Abstracción y Tipo de Máquina Virtual, proporcionando al lector un medio para visualizar las VTs. Al hacerlo, el lector puede ubicar el nivel de abstracción en el que se desarrolla cada VT, además del tipo de máquina proyectada, ya sea un sistema completo o un entorno de ejecución para procesos. La taxonomía propuesta puede ser utilizada en el àmbito acadêmico para facilitar los procesos de ensehanza o en el àmbito empresarial para favorecer la toma de decisiones a la hora de implementar VTs.</p>
			</trans-abstract>
			<kwd-group xml:lang="en">
				<title>Keywords:</title>
				<kwd>container</kwd>
				<kwd>taxonomy</kwd>
				<kwd>virtualization</kwd>
				<kwd>virtual machine</kwd>
				<kwd>virtualization technologies</kwd>
			</kwd-group>
			<kwd-group xml:lang="es">
				<title>Palabras clave:</title>
				<kwd>contenedor</kwd>
				<kwd>máquina virtual</kwd>
				<kwd>taxonomía</kwd>
				<kwd>tecnologías de virtualización</kwd>
			</kwd-group>
			<counts>
				<fig-count count="11"/>
				<table-count count="1"/>
				<equation-count count="0"/>
				<ref-count count="97"/>
				<page-count count="0"/>
			</counts>
		</article-meta>
	</front>
	<body>
		<sec sec-type="intro">
			<title>Introduction</title>
			<p>In recent years Virtualization Technology (VT) has been used to obtain benefits such as isolation, resource splitting, consolidation, security, migration, and ease of management (<xref ref-type="bibr" rid="B85">Varasteh and Goudarzi, 2017</xref>). VT builds an abstraction of applications and hardware in a virtual view (<xref ref-type="bibr" rid="B2">AbdElRahem et al., 2016</xref>). This virtual view can be different from the physical view of computing resources (<xref ref-type="bibr" rid="B78">Stallings, 2015</xref>). In addition, <xref ref-type="bibr" rid="B76">Silberschatz et al. (2014)</xref> note that VT allows an operating systems (OS) to run as an application within another OS.</p>
			<p>VT includes emulation, which refers to the fact that there are differences between the physical and logical architectures used by virtualized processes. Thus, a virtual machine (VM) could use the same host architecture, a different emulated architecture, or a hybrid. In addition, the processes could use a physical architecture with modifications in order to make virtualization easier (paravirtualization).</p>
			<p>VT allows creating one or several environments, <italic>i.e.,</italic> many computers can look like a single large resource (resource aggregation) or, conversely, a single computer is considered as several instances of itself (resource splitting) (<xref ref-type="bibr" rid="B35">Hoopes, 2009</xref>; <xref ref-type="bibr" rid="B76">Silberschatz et al., 2014</xref>).</p>
			<p>Unfortunately, the x86 computer architecture, despite being one of the most widely adopted architectures in the world, cannot be completely virtualized (<xref ref-type="bibr" rid="B6">Adams and Agesen, 2006</xref>). However, this situation can be solved through mechanisms and VT approaches that act at different levels of abstraction. The abstraction levels where VT takes place are the instruction set level, the hardware abstraction level (HAL), the OS level, the user library interface level, and the application level (<xref ref-type="bibr" rid="B56">Nanda and Chiueh, 2005</xref>).</p>
			<p>The concept of <italic>virtualization</italic> was formalized in <xref ref-type="bibr" rid="B32">Goldberg's thesis (1973)</xref> and published in other works (<xref ref-type="bibr" rid="B68">Goldberg, 1974</xref>; <xref ref-type="bibr" rid="B68">Popek and Goldberg, 1974</xref>). In these studies, VMs were defined as &quot;an efficient and isolated duplicate of the real machine&quot; (<xref ref-type="bibr" rid="B32">Goldberg, 1973</xref>, p. 12). In later works, the term VM was expanded to include other kinds of virtualization, including applications at user level such as libraries, system calls, interfaces/services, system configurations, processes, and state files (<xref ref-type="bibr" rid="B56">Nanda and Chiueh, 2005</xref>).</p>
			<p>The term <italic>virtual machine monitor</italic> (VMM) was also established by Popek and <xref ref-type="bibr" rid="B68">Goldberg (1974)</xref>. It is a software layer that supports infrastructure using the resources of a lower level to create multiple independent and isolated VMs (<xref ref-type="bibr" rid="B18">Cafaro and Aloisio, 2011</xref>; <xref ref-type="bibr" rid="B56">Nanda and Chiueh, 2005</xref>). Similarly, <xref ref-type="bibr" rid="B78">Stallings (2015)</xref> determined that a VMM acts as an intermediary between the real machine and VMs. VMMs are also called <italic>hypervisors</italic> (<xref ref-type="bibr" rid="B35">Hoopes, 2009</xref>).</p>
			<p>VT also brings financial benefits regarding returns on investment and reductions in the total cost of ownership of computer systems hardware (<xref ref-type="bibr" rid="B2">AbdElRahem et al., 2016</xref>). Moreover, VT uses less energy, which is related to the so-called <italic>green computing</italic> (<xref ref-type="bibr" rid="B39">Jing et al., 2013</xref>; <xref ref-type="bibr" rid="B70">Ranjith et al., 2017</xref>; <xref ref-type="bibr" rid="B83">Thathera et al., 2015</xref>) and plays an essential role in safeguarding the environment. Other goals of VT include increasing the scalability and availability of computing environments, as well as improving the administrative and security structures of the existing computational infrastructure (<xref ref-type="bibr" rid="B36">Hui and Seok, 2014</xref>; <xref ref-type="bibr" rid="B43">Kusnetzky, 2011</xref>).</p>
			<p>
				<xref ref-type="bibr" rid="B42">Kampert (2010)</xref> indicates that the benefits of VTs have revolutionized data centers in the last two decades and have motivated the development of many variations to suit different use cases. In response, several attempts have been made in the academic literature to establish classification schemes for these variations of VT.</p>
			<p>This paper reviews VT classification schemes and proposes a new taxonomy that responds to several identified weaknesses. This taxonomy improves and unifies the previous works in the classification of VTs in three ways: first, it combines and unifies approaches that consider the VM type with those that consider the level of abstraction; second, it updates classification approaches to include examples of VTs that have emerged more recently; third, it introduces a taxonomic key diagram based on our unified classification, which can guide the selection of VTs in either academic or production environments.</p>
			<p>The remainder of this document comprises the following sections: <italic>VT classification schemes, The need for a new taxonomy, Proposal for a virtual machine taxonomy, Taxonomic key diagram,</italic> and <italic>Conclusions.</italic></p>
			<sec>
				<title>VT classification schemes</title>
				<p>This section presents the results of a literature review by means of a systematic process of combined database search and manual reference tracking using the Snowball technique (<xref ref-type="bibr" rid="B73">Samireh and Claes, 2012</xref>). In this way, 12 classification schemes for VTs were identified, and their characteristics were highlighted. A paragraph is added at the end of each case which highlights the strengths and weaknesses of the classification scheme.</p>
				<sec>
					<title><italic>VT taxonomy by Nanda and Chiueh</italic></title>
					<p>
						<xref ref-type="bibr" rid="B56">Nanda and Chiueh (2005)</xref> classified VTs according to the following five levels of abstraction of a computer system.</p>
					<p>Instruction set architecture (ISA) level</p>
					<p>VTs emulate an ISA, allowing VMs to run as if they were running on hardware. When the ISA offered by this layer differs from the real ISA, this is called <italic>emulation.</italic></p>
					<p>
						<list list-type="bullet">
							<list-item>
								<p>Hardware Abstraction Layer (HAL): </p>
							</list-item>
							<list-item>
								<p>VTs use the same ISA as the host. Here, it is possible to perform independent OS installations, and its applications run as if they were executed in a real environment.</p>
							</list-item>
							<list-item>
								<p>Operating System: VTs work through an OS module to provide a virtualized system call interface.</p>
							</list-item>
							<list-item>
								<p>Library Level: User-level libraries control the communication between the applications and the rest of the system. VTs allow implementation as an Application Binary Interface (ABI) or an Application Programming Interface (API).</p>
							</list-item>
							<list-item>
								<p>Programming Language Level: VTs implement the virtualization layer as an application that can create a simplex or complex VM.</p>
							</list-item>
						</list>
					</p>
					<p>Although <xref ref-type="bibr" rid="B56">Nanda and Chiueh (2005)</xref> establish a way to classify VTs, they do not consider virtualization types at the same level of abstraction. Besides, it is necessary to include some VTs that have emerged in recent years.</p>
					<p>
						<fig id="f1">
							<label>Figure 1</label>
							<caption>
								<title>VM taxonomy proposed by <xref ref-type="bibr" rid="B77">Smith and Nair in 2005</xref>
								</title>
							</caption>
							<graphic xlink:href="0120-5609-iei-42-03-e214-gf1.png"/>
							<attrib>Source: <xref ref-type="bibr" rid="B77">Smith and Nair (2005)</xref>
							</attrib>
						</fig>
					</p>
					<p>
						<xref ref-type="bibr" rid="B77">Smith and Nair (2005)</xref> presented a taxonomy with two main categories: Process VMs and System VMs. Furthermore, these categories divide VTs according to whether the ISA supported in the VM is the same as the underlying hardware (<xref ref-type="fig" rid="f1">Figure 1</xref>).</p>
				</sec>
				<sec>
					<title><italic>Process VMs</italic></title>
					<p>This category describes an environment in the ABI interface or at the API level. It is called a <italic>Multiprogrammed System</italic> when it uses the same ISA; otherwise, it is called <italic>Dynamic Emulator</italic> or <italic>Binary Translator.</italic> The subcategories are described below:</p>
					<p>Multiprogrammed Systems are multiprogramming OSs that implement the management of timeshare access to the available underlying hardware resources. These systems use the same ISA and can handle multiple user processes 'simultaneously'. The OS delivers an individual VM for each user process that runs concurrently. One implementation in this context involves dynamic binary optimizers using the same ISA from the host system.</p>
					<p>Dynamic Emulators use process VMs to support compiled binary programs for an ISA different from the underlying hardware. This condition implies executing an emulation effort performed through interpretation, which can be relatively slow. However, this situation can be compensated when a software cache is implemented in order to deal with the overload.</p>
				</sec>
				<sec>
					<title><italic>System VMs</italic></title>
					<p>These are characterized by hosting one or several complete and independent OSs running simultaneously on the same hardware of the host computer, which results from the intermediation performed by the VMM. The subcategories of the system VMs are described below:</p>
					<p>
						<list list-type="bullet">
							<list-item>
								<p>Classic System VMs use the VMM and execute it directly on the bare hardware without an underlying OS. Thus, the VMM has real access to hardware resources and serves as an intermediary between the guest OSs and the hardware itself. In this case, the VMs are called <italic>Hosted VMs.</italic></p>
							</list-item>
							<list-item>
								<p>Whole-system VMs provide virtualization of a complete environment, but guest systems use an ISA different from those used in the underlying hardware, unlike the previous category. In this case, the VMs are called <italic>Codesigned VMs.</italic></p>
							</list-item>
						</list>
					</p>
					<p>
						<xref ref-type="bibr" rid="B77">Smith and Nair's study (2005)</xref> can be considered an essential basis for classifying VTs that provide a virtual environment for a complete system or processes. However, this work does not contemplate what was established by <xref ref-type="bibr" rid="B56">Nanda and Chiueh (2005)</xref> regarding the levels of abstraction. Another important aspect is that this classification model does not have a high degree of detail; it uses very general descriptions, without even including specific technologies. It is essential to consider that this study was carried out in 2005 and does not include subsequently developed technologies.</p>
				</sec>
				<sec>
					<title>Virtualization taxonomy by the SCOPE Alliance</title>
					<p>The <xref ref-type="bibr" rid="B74">SCOPE Alliance (2008)</xref> proposed an extension of the work carried out by <xref ref-type="bibr" rid="B77">Smith and Nair in 2005</xref>. The proposal includes more branching of the main categories and more examples of VTs (<xref ref-type="fig" rid="f2">Figure 2</xref>).</p>
					<p>
						<fig id="f2">
							<label>Figure 2</label>
							<caption>
								<title>Virtualization taxonomy by the SCOPE Alliance</title>
							</caption>
							<graphic xlink:href="0120-5609-iei-42-03-e214-gf2.png"/>
							<attrib>Source: <xref ref-type="bibr" rid="B74">SCOPE Alliance (2008)</xref>
							</attrib>
						</fig>
					</p>
					<p>This classification places type I and type II hypervisors as distinctions of the Classic OS VM model of System VMs that support the same ISA as the underlying hardware.</p>
					<p>Regarding the Process VMs category, this classification distinguishes between a Multiprogrammed System and Dynamic Translators. Multiprogrammed Systems are further classified depending on whether the OS provided by the underlying system is the same as the OS used by the application. If it uses the same OS, the category is called <italic>Multitask OS,</italic> which contains OS Virtualization. If the OS is different, it is called <italic>OS Translator.</italic> When the processes are based on a different ISA, they are called <italic>Dynamic Translators.</italic> Finally, if the VMs use the same OS, they are called <italic>ISA &amp; ABI Translators;</italic> otherwise, they are called <italic>High-level Language.</italic></p>
					<p>Although the SCOPE Alliance's study (2008) contributes to complementing the taxonomy of VTs, the research does not contemplate aspects such as the levels of abstraction indicated by <xref ref-type="bibr" rid="B56">Nanda and Chiueh (2005)</xref>. This situation gives rise to problems of conceptual inference, in which, for example, type I and type II hypervisors are perceived to be at the same level of abstraction. Additionally, according to the date of publication of the study, it is necessary to expand concepts and update VTs that have emerged in recent years.</p>
				</sec>
				<sec>
					<title>Taxonomy of VTs by Kampert</title>
					<p>
						<xref ref-type="bibr" rid="B42">Kampert (2010)</xref> presented his taxonomy of VTs using different virtualization techniques. This taxonomy uses the unified modeling language, as shown in <xref ref-type="fig" rid="f3">Figure 3</xref>, where all elements are classes. For example, the class Domain is a superclass of the classes Server, Application, Desktop, Storage, and Network.</p>
					<p>
						<xref ref-type="bibr" rid="B42">Kampert's taxonomy (2010)</xref> aims to cover the domains in a complete way in which the concept of virtualization takes place, including storage and network virtualization not seen in previous taxonomies. However, this taxonomy itself does not offer the level of granularity necessary to identify VTs in each of the specified domains.</p>
					<p>
						<fig id="f3">
							<label>Figure 3</label>
							<caption>
								<title>VT taxonomy by Pual Kampert</title>
							</caption>
							<graphic xlink:href="0120-5609-iei-42-03-e214-gf3.png"/>
							<attrib>Source: <xref ref-type="bibr" rid="B42">Kampert (2010)</xref>
							</attrib>
						</fig>
					</p>
				</sec>
				<sec>
					<title>Virtualization model by Kusnetzky</title>
					<p>
						<xref ref-type="bibr" rid="B43">Kusnetzky's virtualization model (2011)</xref> is composed of seven parts, five distributed in layers, and two arranged parallel to the layers above <xref ref-type="bibr" rid="B42">Kampert (2010)</xref>. Each part is briefly described below:</p>
					<p>
						<list list-type="bullet">
							<list-item>
								<p>Access virtualization: Many users share the same system.</p>
							</list-item>
							<list-item>
								<p>Application virtualization: Many applications run transparently on different OSs and hardware platforms.</p>
							</list-item>
							<list-item>
								<p>Processing virtualization allows the division or aggregation of resources.</p>
							</list-item>
							<list-item>
								<p>Network virtualization presents a logical view of the physical network elements.</p>
							</list-item>
							<list-item>
								<p>Storage virtualization hides the location and type of physical storage devices in which applications store their data.</p>
							</list-item>
							<list-item>
								<p>Security for virtual environment controls the access to the various elements of virtual media in order to protect them from unauthorized actions.</p>
							</list-item>
							<list-item>
								<p>Management of the virtual environment controls the available physical resources and the generated virtual environments.</p>
							</list-item>
						</list>
					</p>
					<p>
						<fig id="f4">
							<label>Figure 4</label>
							<caption>
								<title>Kusnetzky's model of virtualization</title>
							</caption>
							<graphic xlink:href="0120-5609-iei-42-03-e214-gf4.png"/>
							<attrib>Source: <xref ref-type="bibr" rid="B43">Kusnetzky (2011)</xref>
							</attrib>
						</fig>
					</p>
					<p>Kusnetzky presents a way to include categories for a range of virtualizable computational resources but does not provide details about the existing VTs in each layer of the model. In addition, the model does not differentiate between technologies of the same layer. For example, in Processing Virtualization, there is no evidence of a difference between the types of VMs present in type I or type II hypervisors.</p>
				</sec>
				<sec>
					<title>Taxonomy of VTs by Pessolani</title>
					<p>
						<xref ref-type="bibr" rid="B66">Pessolani et al. (2012)</xref> proposed their taxonomy of VTs with five main categories: 1) Hardware or System Virtualization, 2) Para-virtualization, 3) Virtualization based on OS, 4) Virtualization at the Process or Application level, and 5) Virtualization of OS. Additionally, the main categories include subcategories that suggest a level of abstraction (<xref ref-type="fig" rid="f5">Figure 5</xref>). These main categories are described below:</p>
					<p>
						<fig id="f5">
							<label>Figure 5</label>
							<caption>
								<title>Taxonomy of VTs proposed by Pessolani <italic>et al.</italic></title>
							</caption>
							<graphic xlink:href="0120-5609-iei-42-03-e214-gf5.png"/>
							<attrib>Source: <xref ref-type="bibr" rid="B66">Pessolani et al. (2012)</xref>
							</attrib>
						</fig>
					</p>
					<p>
						<list list-type="bullet">
							<list-item>
								<p>Hardware or System Virtualization puts the type I hypervisor on top of the hardware with its VMs and their respective guest OSs.</p>
							</list-item>
							<list-item>
								<p>Paravirtualization distributes its elements to Hardware or System Virtualization, but the guest OS is modified to be aware that it is virtualized.</p>
							</list-item>
							<list-item>
								<p>Virtualization based on OS is founded on using independent workspaces called <italic>containers,</italic> which are based on the host OS.</p>
							</list-item>
							<list-item>
								<p>Virtualization at the Process or Application level uses an application on the host OS to provide a VM that allows the execution of processes based on it.</p>
							</list-item>
							<list-item>
								<p>Virtualization of OS needs a host OS to carry out the functions of a hypervisor in order to support the guest OSs, which in turn have their own completely independent applications.</p>
							</list-item>
						</list>
					</p>
					<p>
						<xref ref-type="bibr" rid="B66">Pessolani's taxonomy (2012)</xref> does not explicitly consider the levels of abstraction to which these technologies apply. In addition, it focuses only on the conceptual elements, leaving specific examples aside, nor does it establish a way to divide types of VMs within each main category.</p>
				</sec>
				<sec>
					<title>Taxonomy of virtualization concepts by Pék</title>
					<p>
						<xref ref-type="bibr" rid="B64">Pék et al. published a taxonomy of virtualization concepts in 2013</xref>. This work extends the studies by <xref ref-type="bibr" rid="B77">Smith and Nair (2005)</xref> an the <xref ref-type="bibr" rid="B74">SCOPE Alliance (2008)</xref> (<xref ref-type="fig" rid="f6">Figure 6</xref>).</p>
					<p>This taxonomy adds elements and several components, such as in the Hosted category, equivalent to type II hypervisors from the study by the <xref ref-type="bibr" rid="B74">SCOPE Alliance (2008)</xref>. It also includes the Paravirtualization subcategory.</p>
					<p>
						<fig id="f6">
							<label>Figure 6</label>
							<caption>
								<title>Taxonomy of virtualization concepts by Pék <italic>et al.</italic></title>
							</caption>
							<graphic xlink:href="0120-5609-iei-42-03-e214-gf6.png"/>
							<attrib>Source: <xref ref-type="bibr" rid="B64">Pék et al. (2013)</xref>
							</attrib>
						</fig>
					</p>
					<p>Although the study by <xref ref-type="bibr" rid="B64">Pék et al. (2013)</xref> presents an extension to some previous works, this taxonomy leaves a gap in the search for the details of VT categorization, since they do not contemplate the levels of abstraction at which VTs are implemented.</p>
					<p>
						<fig id="f7">
							<label>Figure 7</label>
							<caption>
								<title>Taxonomy of virtualization by Ameen and Hämo</title>
							</caption>
							<graphic xlink:href="0120-5609-iei-42-03-e214-gf7.png"/>
							<attrib>Source: <xref ref-type="bibr" rid="B7">Ameen and Hamo (2013)</xref>
							</attrib>
						</fig>
					</p>
					<p>
						<xref ref-type="bibr" rid="B7">Ameen and Hamo presented a taxonomy with three levels in 2013</xref>. (<xref ref-type="fig" rid="f7">Figure 7</xref>). The first level contains the following ten categories:</p>
					<p>
						<list list-type="bullet">
							<list-item>
								<p>Mobile software that is embedded on a mobile phone to decouple the applications and data from the underlying hardware (<xref ref-type="bibr" rid="B87">VMware, 2022</xref>).</p>
							</list-item>
							<list-item>
								<p>Data abstracts the source of individual data items and provides a common data access layer for different data access methods such as SQL, XML, JDBC, File access, MQ, JMS, <italic>etc.</italic> (<xref ref-type="bibr" rid="B54">Mann, 2006</xref>).</p>
							</list-item>
							<list-item>
								<p>Memory adds an extra level of address translation to give each VM the illusion of having zero memory address space, as real hardware provides (<xref ref-type="bibr" rid="B89">Waldspurger, 2002</xref>).</p>
							</list-item>
							<list-item>
								<p>Desktop is the ability to display a graphical desktop from one computer system on another computer (<xref ref-type="bibr" rid="B88">von Hagen, 2008</xref>).</p>
							</list-item>
							<list-item>
								<p>Storage creates logical abstractions of physical storage systems (B. <xref ref-type="bibr" rid="B45">Li et al., 2005</xref>).</p>
							</list-item>
							<list-item>
								<p>Server is a type of virtualization that allows running many OSs both in isolation and independence.</p>
							</list-item>
							<list-item>
								<p>Network provides an abstraction layer that can decouple the physical network equipment from the delivered business services over the network (<xref ref-type="bibr" rid="B8">Annapareddy, 2011</xref>).</p>
							</list-item>
							<list-item>
								<p>Application allows the user to run the application using local resources without installing the application in his system completely (<xref ref-type="bibr" rid="B8">Annapareddy, 2011</xref>; <xref ref-type="bibr" rid="B92">White and Pilbeam, 2010</xref>).</p>
							</list-item>
							<list-item>
								<p>Grid provides a way to abstract multiple physical servers from the application they are running (<xref ref-type="bibr" rid="B54">Mann, 2006</xref>).</p>
							</list-item>
							<list-item>
								<p>Clustering causes several locally connected physical systems to appear to the application and end-users as a single processing resource (<xref ref-type="bibr" rid="B54">Mann, 2006</xref>).</p>
							</list-item>
							<list-item>
								<p>The following describes the virtualization types at the second level of the taxonomy, which are derived from the Server category, as indicated by <xref ref-type="bibr" rid="B7">Ameen and Hamo (2013</xref>):</p>
							</list-item>
							<list-item>
								<p>Emulation is a virtualization method in which you can create a complete hardware architecture in software (<xref ref-type="bibr" rid="B7">Ameen and Hamo, 2013</xref>).</p>
							</list-item>
							<list-item>
								<p>Hosted OS uses software-only. The hypervisor is over an OS (<xref ref-type="bibr" rid="B7">Ameen and Hamo, 2013</xref>; <xref ref-type="bibr" rid="B88">von Hagen, 2008</xref>).</p>
							</list-item>
							<list-item>
								<p>Hardware the hypervisor is assisted by processor hardware such as AMD-V or Intel VT-x processor virtualization technologies (<xref ref-type="bibr" rid="B88">von Hagen, 2008</xref>).</p>
							</list-item>
							<list-item>
								<p>Paravirtualization, according to <xref ref-type="bibr" rid="B7">Ameen and Hamo (2013</xref>, p. 7), is &quot;a technique in which the guest OS includes modified (para-virtualized) I/O drivers for the hardware&quot;.</p>
							</list-item>
							<list-item>
								<p>Container is a kernel-layer abstraction and refers to techniques in which the abstraction technology is built directly into the OS kernel rather than having a separate hypervisor layer (<xref ref-type="bibr" rid="B7">Ameen and Hamo, 2013</xref>; Q. <xref ref-type="bibr" rid="B48">Lin et al., 2012</xref>).</p>
							</list-item>
							<list-item>
								<p>Hybrid is a combination of Full Virtualization and Paravirtualization that uses input/output (I/O) acceleration techniques (<xref ref-type="bibr" rid="B92">White and Pilbeam, 2010</xref>).</p>
							</list-item>
						</list>
					</p>
					<p>
						<xref ref-type="bibr" rid="B7">Ameen and Hamo's taxonomy (2013)</xref> is closely related to the works by <xref ref-type="bibr" rid="B42">Kampert (2010)</xref> and <xref ref-type="bibr" rid="B43">Kusnetzky (2011)</xref>. Furthermore, it presents a classification scheme through a three-level hierarchical structure. However, although this graphical representation is interesting, it is unbalanced, since it focuses only on detailing the Server category.</p>
				</sec>
				<sec>
					<title>Taxonomy of VTs by Abdulhamid</title>
					<p>
						<xref ref-type="bibr" rid="B3">Abdulhamid et al. (2014)</xref> presented a taxonomy focused on cloud computing (<xref ref-type="bibr" rid="B1">Abdekhoda et al., 2019</xref>; <xref ref-type="bibr" rid="B28">Fareghzadeh et al., 2019</xref>) and based on the work by <xref ref-type="bibr" rid="B72">Sahoo et al. (2010)</xref>, which includes categories such as Full Virtualization, OS-Layer Virtualization, Hardware-Layer Virtualization, Paravirtualization, Application Virtualization, Resource virtualization, and Storage virtualization. In addition, this work adds the Grid Virtualization and Cloud Virtualization categories (<xref ref-type="fig" rid="f8">Figure 8</xref>).</p>
					<p>At the third level of the taxonomy are the type I and type II hypervisor categories derived from Server/Hardware.</p>
					<p>
						<fig id="f8">
							<label>Figure 8</label>
							<caption>
								<title>Taxonomy of VTs by Abdulhamid</title>
							</caption>
							<graphic xlink:href="0120-5609-iei-42-03-e214-gf8.png"/>
							<attrib>Source: <xref ref-type="bibr" rid="B3">Abdulhamid et al. (2014)</xref>
							</attrib>
						</fig>
					</p>
					<p>Some categories have already been described. Below is a brief description of the new ones.</p>
					<p>
						<list list-type="bullet">
							<list-item>
								<p>Grid Virtualization focuses on the virtualization of grid resources either for a virtual organization (VO) or for a Virtual Organization Cluster (<xref ref-type="bibr" rid="B3">Abdulhamid et al., 2014</xref>).</p>
							</list-item>
							<list-item>
								<p>Cloud Virtualization or Cloud Computing (<xref ref-type="bibr" rid="B75">Sehgal and Bhatt, 2018</xref>) enables on-demand provisioning of virtual resources through the Web, as well as applying the concept of pay-per-use. In this category, the VTs form cloud computing services, provisioning virtual resources to customers on demand. (<xref ref-type="bibr" rid="B3">Abdulhamid et al., 2014</xref>; <xref ref-type="bibr" rid="B5">Aceto et al., 2013</xref>).</p>
							</list-item>
						</list>
					</p>
					<p>Although the taxonomy by <xref ref-type="bibr" rid="B3">Abdulhamid et al. (2014)</xref> shows two levels, only one level can be observed which comprises its nine categories from a hierarchical perspective. On the other hand, the description of each category lacks details and examples of VTs.</p>
					<p>Types of VMs by Li</p>
					<p>X.-F. <xref ref-type="bibr" rid="B46">Li (2016)</xref> presented his work with four types of VMs:</p>
					<p>
						<list list-type="bullet">
							<list-item>
								<p>Type 1 : The Full ISA VM allows full ISA-level emulation or virtualization. The OS and its applications can run on top of the VM as a real machine (X.-F. <xref ref-type="bibr" rid="B46">Li, 2016</xref>).</p>
							</list-item>
							<list-item>
								<p>Type 2: The ABI VM allows ABI-level emulation of the processes in the guest OS. These applications can run in conjunction with native ABI applications (X.-F. <xref ref-type="bibr" rid="B46">Li, 2016</xref>).</p>
							</list-item>
							<list-item>
								<p>Type 3: The Virtual ISA VM provides a runtime engine for applications encoded in the virtual ISA to run on it (X.-F. <xref ref-type="bibr" rid="B46">Li, 2016</xref>).</p>
							</list-item>
							<list-item>
								<p>Type 4: The Language VM gives a runtime engine that runs programs written in a guest language (source). The runtime engine needs to interpret or translate the program.</p>
							</list-item>
						</list>
					</p>
					<p>Although the study by X.-F. <xref ref-type="bibr" rid="B46">Li (2016)</xref> presented a four-type classification scheme, it does not indicate a hierarchical structure that clarifies how they relate. It also does not have a supporting graph to facilitate understanding. This work does not contemplate many of the categories indicated in other previously presented taxonomies.</p>
				</sec>
				<sec>
					<title>Taxonomy of VMs by Bugnion</title>
					<p>
						<xref ref-type="bibr" rid="B17">Bugnion (2017)</xref> presented a structure with two levels that shows the concepts related to VMs. The first level is related to abstraction, and it includes the following categories: Language-based VM, System-level VM, and Lightweight VM. The second level is related to the platform, and it includes two categories derived from System-level VM, which are called <italic>Machine Simulator</italic> and <italic>Hypervisor.</italic> The latter is divided into Bare-metal Hypervisor (type I) and Hosted Hypervisor (type II) (<xref ref-type="fig" rid="f9">Figure 9</xref>).</p>
					<p>
						<fig id="f9">
							<label>Figure 9</label>
							<caption>
								<title>Taxonomy of VMs and the platforms that run them presented by Bugnion</title>
							</caption>
							<graphic xlink:href="0120-5609-iei-42-03-e214-gf9.png"/>
							<attrib>Source: <xref ref-type="bibr" rid="B17">Bugnion et al. (2017)</xref>
							</attrib>
						</fig>
					</p>
					<p>
						<list list-type="bullet">
							<list-item>
								<p>Language-based VM refers to any managed language runtime environment such as the Java VM, Microsoft Common Language Runtime, and JavaScript engines embedded in browsers.</p>
							</list-item>
							<list-item>
								<p>Lightweight VM refers to software mechanisms to ensure that applications run directly on the processor as securely isolated from other environments and the underlying OS.</p>
							</list-item>
							<list-item>
								<p>System-level VM refers to the computer environment that resembles the hardware of a computer, so that the VM can run an OS and its applications in complete isolation from the other VMs and the rest of the environment. This category includes two Hypervisor types (type I and type II).</p>
							</list-item>
						</list>
					</p>
					<p>
						<xref ref-type="bibr" rid="B17">Bugnion's work (2017)</xref> is less a taxonomy than a book focusing on the core architectural support provided by hardware to run VMs efficiently.</p>
				</sec>
			</sec>
			<sec>
				<title>The need for a new taxonomy</title>
				<p>The taxonomies described above have many elements that contribute to the classification of VTs. However, in each of these classification schemes, some aspects that need improvement have been identified. Each scheme offers a taxonomic approach, such as a) Abstraction Level, b) Type of VM, and c) Virtualization Domains. <xref ref-type="table" rid="t1">Table 1</xref> summarizes the classification schemes analyzed in this paper by author, year, and taxonomic approach, which were published between 2005 and 2017. It is worth noting that we found no taxonomies published between 2018 and 2021.</p>
				<p>
					<table-wrap id="t1">
						<label>Table 1</label>
						<caption>
							<title>Summary of classification schemes</title>
						</caption>
						<graphic xlink:href="0120-5609-iei-42-03-e214-gt1.png"/>
						<table-wrap-foot>
							<fn id="TFN1">
								<p>Source: Authors</p>
							</fn>
						</table-wrap-foot>
					</table-wrap>
				</p>
				<p>The Type of VM is the most popular approach, as demonstrated by CS2, CS3, CS6, and ACS7. On the other hand, CS4 and CS5 take a different perspective; their objective is to consider, in a general way, the largest number of technological domains in which it is possible to carry out virtualization processes, hence the name Virtualization Domain. Some taxonomies have a dual approach; for example, CS8 and CS9 combine the Type of VM with the Virtualization Domain, and CS11 combines the Type of VM with the Abstraction Level. Lastly, CS1 and CS10 consider the Abstraction Level approach as fundamental for the categorization of VTs. These differences in viewing VTs can confuse the community interested in this field when reading different authors.</p>
				<p>Therefore, there is a need for a new taxonomy that provides a unified, organized, and current view of VTs. Therefore, this paper makes the following contributions:</p>
				<p>
					<list list-type="bullet">
						<list-item>
							<p>A review of the literature with the identification, analysis, and comparison of 12 classification VT schemes (<xref ref-type="table" rid="t1">Table 1</xref>).</p>
						</list-item>
						<list-item>
							<p>A proposal for a new VM taxonomy. This work identified, expanded, and combined different studies, offering a single view of multiple concepts such as the Types of VMs and their corresponding Abstraction Level. The taxonomy includes examples of older VTs in order to provide a reference factor to those who have some knowledge about them. It also includes examples of new VTs that have gained wide recognition in the industry and academia, such as those related to containers. The taxonomy is also intended to be an instrument to support the pedagogical processes within the academic community with interests in VTs (<xref ref-type="fig" rid="f10">Figure 10</xref>).</p>
						</list-item>
						<list-item>
							<p>A taxonomic key diagram that facilitates the visualization of the technological ecosystem that surrounds this topic and consequently helps the academic and industrial community in the decision-making processes regarding the selection of VTs (<xref ref-type="fig" rid="f11">Figure 11</xref>).</p>
						</list-item>
					</list>
				</p>
			</sec>
			<sec>
				<title>Proposal for a virtual machine taxonomy</title>
				<p>This section presents a new taxonomic proposal for virtualization technologies. This taxonomy considers the 12 studies reviewed in this research, but it focuses mainly on studies such as CS1, CS2, CS3, CS7, and CS11 (<xref ref-type="fig" rid="f10">Figure 10</xref>). The proposal presents an innovative contribution that integrates the Abstraction Level and Type of VM taxonomic approaches. In addition, it contributes by extending the examples of VTs, which are placed in the diagram representing the new taxonomy. The first approach considers the layers of the classical architecture of a computer system and makes it possible to visualize the VTs according to the level of abstraction they occupy at the time of execution. The second approach considers the types of virtual machines, be it complete systems or execution environments for processes. The description of the taxonomy is shown below, making a cross-analysis between the two approaches.</p>
				<p>
					<fig id="f10">
						<label>Figure 10</label>
						<caption>
							<title>Proposal for a new virtual machine taxonomy</title>
						</caption>
						<graphic xlink:href="0120-5609-iei-42-03-e214-gf10.jpg"/>
						<attrib>Source: Authors.</attrib>
					</fig>
				</p>
				<sec>
					<title>Approach 1: abstraction layers</title>
					<p>The first approach of this taxonomy uses the abstraction layers in a computer system, such as the Hardware Abstraction Layer (HAL), the Operating System (OS), the Application Binary Interface (ABI), the Application Programming Interface (API), Type I/Type II Hypervisors, and Libraries. In <xref ref-type="fig" rid="f10">Figure 10</xref>, the labels located on the left side indicate the abstraction level, and they are the title of rectangular structures with horizontal distribution in the taxonomy. With these layers, the taxonomy makes it possible to locate VTs depending on the level at which they take place. Thus, the reader can quickly infer aspects such as the dependence or not of an underlying OS, as well as determine the number of intermediaries involved in the virtualization process. Furthermore, this information allows inferring the possible performance of these technologies. The abstraction layers are described below from bottom to top.</p>
				</sec>
				<sec>
					<title><italic>Hardware Abstraction Layer (HAL)</italic></title>
					<p>HAL includes those VTs that are placed directly on top of the hardware. This arrangement is also known as <italic>BareMetal</italic> and is identified by the absence of intermediaries between the VMs and the underlying hardware, suggesting a higher performance for the set of VTs placed here. This layer contains the category called <italic>Type I Hypervisor</italic> and can have several types of VTs.</p>
				</sec>
				<sec>
					<title><italic>Operating System (OS)</italic></title>
					<p>This layer contains the sublayers Application Binary Interface (ABI) and Application Programming Interface (API). In the ABI sublayer, the VTs use the OS as an intermediary to access the underlying hardware. The virtualization is carried by OS calls and uses Dynamic Binary Translation, Type II Hypervisors, or Libraries. This situation suggests that the VTs may present degradation in performance due to intermediation costs between the different environments. VTs implement virtualization based on high-level languages, offering portability in the API sublayer, as APIs support multiple hardware and software platforms. However, this sublayer has considerable degradation given the multiple interpreters between the VTs and the hardware functions.</p>
				</sec>
				<sec>
					<title>Approach 2: Type of VM</title>
					<p>The second approach of this taxonomy considers VTs according to their type: System VMs or Process VMs. System VMs contain a whole OS (guest OS) within their virtual environment. On the other hand, Process VMs use the host OS as an intermediary between the virtual environment and the actual hardware.</p>
				</sec>
				<sec>
					<title><italic>System VMs</italic></title>
					<p>This type of virtualization has two categories. The first is <italic>C</italic>lassic System VMs and is characterized by the fact that the host and guest OSs have the same ISA. The second category is Whole-System VMs and is characterized by the host OS and guest OS having a different ISA.</p>
					<p>
						<list list-type="bullet">
							<list-item>
								<p>Classic System VMs: This category is known as <italic>Hardware Virtualization</italic> and includes two subcategories: the first one is Native VMs, and the second one is Hosted VMs. It is important to note that each subcategory takes place at different levels of abstraction.</p>
							</list-item>
							<list-item>
								<p>Native VMs: This VT is also known as <italic>Type I Hypervisor</italic> and corresponds to the HAL abstraction level. It uses a software layer directly on top of the hardware. It also presents a subdivision, as shown below:</p>
							</list-item>
							<list-item>
								<p>Transparent indicates that the OS inside the VM is unaware of its virtualization state and is divided into the following types:</p>
							</list-item>
							<list-item>
								<p>Hardware-Assisted virtualization involves the use of physical components to facilitate the management of VMs. Examples of this are: <xref ref-type="bibr" rid="B44">KVM (2021)</xref>, Microsoft Hyper-V (<xref ref-type="bibr" rid="B38">Jason et al., 2009</xref>; <xref ref-type="bibr" rid="B80">Syrewicze and Siddaway, 2018</xref>), Xen (<xref ref-type="bibr" rid="B94">Xen Cambridge, 2022</xref>), VLX (<xref ref-type="bibr" rid="B10">Armand and Gien, 2009</xref>), and VMware ESX/ESXi (<xref ref-type="bibr" rid="B47">Z. Li, 2021</xref>; <xref ref-type="bibr" rid="B87">VMware, 2022</xref>).</p>
							</list-item>
							<list-item>
								<p>Dynamic Binary Translation implies that the Type I Hypervisor catches and inspects the code of each guest OS request to convert it into a proper request towards the underlying hardware, <italic>e.g.,</italic> VMware ESX/ESXi (<xref ref-type="bibr" rid="B47">Z. Li, 2021</xref>; <xref ref-type="bibr" rid="B87">VMware, 2022</xref>) and XtratuM (<xref ref-type="bibr" rid="B90">Wessman et al., 2021</xref>; <xref ref-type="bibr" rid="B96">Xtratum, 2022</xref>) .</p>
							</list-item>
							<list-item>
								<p>Para-virtualized is also known as <italic>Operating System-Assisted Virtualization</italic> and refers to efficient communication between the guest OS and the hypervisor. This implies modifying the guest OS to be aware of virtualization and to take advantage of that condition. Examples of this are: Xen (<xref ref-type="bibr" rid="B13">Barham et al., 2003</xref>; <xref ref-type="bibr" rid="B55">Matthews et al., 2008</xref>; <xref ref-type="bibr" rid="B94">Xen Cambridge, 2022</xref>; Xen Project, 2022), VLX (<xref ref-type="bibr" rid="B10">Armand and Gien, 2009</xref>), KVM (<xref ref-type="bibr" rid="B4">Abeni and Faggioli, 2020</xref>; <xref ref-type="bibr" rid="B44">KVM, 2021</xref>), and VMware VMI (<xref ref-type="bibr" rid="B87">VMware, 2022</xref>).</p>
							</list-item>
							<list-item>
								<p>Hosted VMs: This subcategory is also known as <italic>Type 2 Hypervisors,</italic> corresponds to the ABI abstraction level, and uses a layer of software on a Host OS. It presents the same subdivision and functions of the Native VMs category, so only examples of VTs will be listed below.</p>
							</list-item>
							<list-item>
								<p>Transparent</p>
							</list-item>
							<list-item>
								<p>Hardware-Assisted: VMware Workstation/ Fusion (<xref ref-type="bibr" rid="B87">VMware, 2022</xref>), Parallels Desktop (<xref ref-type="bibr" rid="B62">Parallels, 2021</xref>), and Oracle VirtualBox (<xref ref-type="bibr" rid="B61">Oracle, 2021b</xref>).</p>
							</list-item>
							<list-item>
								<p>Dynamic Binary Translation: VMware Workstation/Fusion (<xref ref-type="bibr" rid="B87">VMware, 2022</xref>; <xref ref-type="bibr" rid="B46">Z. Li, 2021</xref>), Microsoft Virtual PC (<xref ref-type="bibr" rid="B34">Honeycutt, 2003</xref>), <xref ref-type="bibr" rid="B67">Plex86 (2021)</xref>, Parallels Desktop (<xref ref-type="bibr" rid="B62">Parallels, 2021</xref>), and Oracle VirtualBox (<xref ref-type="bibr" rid="B61">Oracle, 2021b</xref>).</p>
							</list-item>
							<list-item>
								<p>Para-virtualized: VMware Workstation, with the addition of the corresponding para-virtualization driver to the network in the guest OS (<xref ref-type="bibr" rid="B25">El-Anani, 2021</xref>; <xref ref-type="bibr" rid="B87">VMware, 2022</xref>).</p>
							</list-item>
							<list-item>
								<p>Whole system VMs: This category is called <italic>Hardware Emulation</italic> and presents an ISA different from the underlying hardware. It takes place at the API abstraction level, evidencing a preexisting OS on which emulation can occur. The subcategory is called <italic>Dynamic Binary Translation</italic> and features VTs such as QEMU (<xref ref-type="bibr" rid="B22">Diaz et al., 2021</xref>; <xref ref-type="bibr" rid="B69">QEMU, 2021</xref>), Simcs (<xref ref-type="bibr" rid="B53">Magnusson et al., 2002</xref>), Bochs (<xref ref-type="bibr" rid="B16">Bochs, 2021</xref>), Rosetta (<xref ref-type="bibr" rid="B9">Apple Inc, 2009</xref>), and BIRD (<xref ref-type="bibr" rid="B57">Nanda et al., 2006</xref>).</p>
							</list-item>
						</list>
					</p>
				</sec>
				<sec>
					<title><italic>Process VMs</italic></title>
					<p>This type of virtualization also has the same two categories as System VMs, depending on whether the host OS and guest OS have the same ISA. When the ISA is the same, the category is called <italic>Multiprogrammed Systems;</italic> otherwise, the category is called <italic>Dynamic Translators.</italic> Both categories are located at the OS layer.</p>
					<p>
						<list list-type="bullet">
							<list-item>
								<p>Multi-programmed systems: In this category, the VTs share the OS among many processes, generating independent execution spaces for each one. This generates the illusion that, for a moment, a process is an exclusive executor in the system. This category is then divided into two, depending on whether there is an OS. When the same OS is projecting, the category is called <italic>Multitasking OS;</italic> otherwise, it is called <italic>OS Translators.</italic></p>
							</list-item>
							<list-item>
								<p>Multitasking OS is divided into Operating System Virtualization and Same-ISA Dynamic Binary Optimizer.</p>
							</list-item>
							<list-item>
								<p>Operating System Virtualization happens at the ABI abstraction level and uses system calls for interaction with the underlying hardware. It uses the preexisting OS, and it allows generating independent workspaces for the processes. This type of virtualization is booming and is often known as l<italic>ightweight virtualization, container-based,</italic> or simply <italic>containers</italic> (<xref ref-type="bibr" rid="B81">Tfrifonov, 2018</xref>). For example: FreeBSD Jails (<xref ref-type="bibr" rid="B15">Biederman, 2006</xref>; <xref ref-type="bibr" rid="B41">Kamp and Watson, 2000</xref>) (<xref ref-type="bibr" rid="B71">Ryding and Johansson, 2020</xref>) , Solaris Zones/Containers (<xref ref-type="bibr" rid="B60">Oracle, 2021a</xref>), OpenVZ (2021), Linux-VServer (<xref ref-type="bibr" rid="B51">Linux-VServer, 2018</xref>), AIX Workload Partitions WPAR (<xref ref-type="bibr" rid="B31">Gibson, 2007</xref>), Parallels Virtuozzo Containers (<xref ref-type="bibr" rid="B86">Virtuozzo, 2022</xref>), Denali (<xref ref-type="bibr" rid="B91">Whitaker et al., 2002</xref>), Google Native Client (<xref ref-type="bibr" rid="B97">Yee et al., 2009</xref>), Vx32 (<xref ref-type="bibr" rid="B30">Ford and Cox, 2008</xref>), User-Mode Linux (<xref ref-type="bibr" rid="B23">Dike, 2006</xref>; <xref ref-type="bibr" rid="B84">User-Mode Linux, 2022</xref>), Minix Over Linux (<xref ref-type="bibr" rid="B65">Pessolani and Jara, 2011</xref>), <xref ref-type="bibr" rid="B86">Ensim (2022)</xref>, LXC (<xref ref-type="bibr" rid="B19">Canonical Ltd., 2021</xref>), Docker (<xref ref-type="bibr" rid="B24">Docker, 2022</xref>; <xref ref-type="bibr" rid="B71">Ryding and Johansson, 2020</xref>), and Singularity (<xref ref-type="bibr" rid="B20">Chang et al., 2021</xref>; <xref ref-type="bibr" rid="B79">Sylabs.io, 2022</xref>).</p>
							</list-item>
						</list>
					</p>
					<p>Same-ISA Dynamic Binary Optimizers are translators implemented in software that perform optimized translations of binary code with an equal ISA. Their operation is transparent, and even the system's native binaries can be optimized. An example of this is the Dynamo project (<xref ref-type="bibr" rid="B11">Bala et al., 2011</xref>).</p>
					<p>Operating System Translators allow the execution of applications built for OSs different from the system host, <italic>e.g.,</italic> WINE (<xref ref-type="bibr" rid="B40">Jones et al., 2018</xref>; <xref ref-type="bibr" rid="B93">Wine, 2022</xref>), WABI (<xref ref-type="bibr" rid="B59">Oracle, 2018</xref>), <xref ref-type="bibr" rid="B52">Lxrun (2022)</xref>, Visual MainWin (<xref ref-type="bibr" rid="B29">Fisher et al., 2006</xref>), and Vcuda (<xref ref-type="bibr" rid="B12">Balis et al., 2021</xref> ; S. <xref ref-type="bibr" rid="B49">Lin et al., 2009</xref>).</p>
					<p>Dynamic Translators: Dynamic ISA translators can support processes that use the same host OS, <italic>e.g.,</italic> FX!32 (<xref ref-type="bibr" rid="B21">Chernoff et al., 1998</xref>). It can also be the case of dynamic ISA translations for processes that use a different OS than the host, such as Transitive (<xref ref-type="bibr" rid="B27">eWeek, 2008</xref>; <xref ref-type="bibr" rid="B3">IBM, 2008</xref>).</p>
					<p>For the above cases, the translation occurs at the Library level. It can also be the case of dynamic ISA translators for processes using a different OS and acting through high-level languages such as Java Virtual Machine (JVM) (<xref ref-type="bibr" rid="B50">Lindholm et al., 1997</xref>; <xref ref-type="bibr" rid="B14">Beronic et al., 2021</xref>), the Microsoft .NET common language infrastructure (CLI) (<xref ref-type="bibr" rid="B82">Thai and Lam, 2003</xref>), and <xref ref-type="bibr" rid="B63">Parrot (2022)</xref>.</p>
				</sec>
			</sec>
			<sec>
				<title>Taxonomic key diagram</title>
				<p>This work also proposes a taxonomic key diagram to guide decision-making about the technologies related to VMs, as indicated in the proposed taxonomy (<xref ref-type="fig" rid="f11">Figure 11</xref>). The diagram uses a set of questions, which, depending on each possible answer, establishes a path that leads to identifying a VT defined in the aforementioned taxonomy. For example, the diagram can be used by asking the question 'Do you need to virtualize the entire system or just some of its processes?' If the complete system needs to be virtualized, the following question will inquire about the specific need. If the desired virtual system needs an ISA different from the underlying hardware, the answer from the taxonomic key is the Dynamic Binary Translation category, <italic>e.g.,</italic> QEMU, Simics, and Bochs.</p>
				<p>
					<fig id="f11">
						<label>Figure 11</label>
						<caption>
							<title>Taxonomic key diagram to select VTs</title>
						</caption>
						<graphic xlink:href="0120-5609-iei-42-03-e214-gf11.png"/>
						<attrib>Source: Authors</attrib>
					</fig>
				</p>
			</sec>
		</sec>
		<sec sec-type="conclusions">
			<title>Conclusions</title>
			<p>A review of literature on the different classification schemes for virtualization technologies proposed since 2005. These schemes have been introduced using a timeline that has allowed the identification of the following taxonomic approaches: Abstraction Level, Virtual Machine Type, and Virtualization Domains.</p>
			<p>When performing the analysis of each classification scheme, it was possible to identify weaknesses. These include the presence of a single taxonomic approach in each scheme and the lack of topicality considering the date of publication, as well as the absence of the details on the inclusion of technologies.</p>
			<p>The proposed taxonomy responds to the needs identified in the analyzed classification schemes. As a result, the proposal combines the Abstraction Level and Virtual Machine Type approaches, giving the reader a means of visualizing the virtualization technologies relating to virtual machines. By doing so, the reader is always aware of the level of abstraction at which each technology takes place, in addition to the type of machine projected, be it a complete system or an execution environment for processes.</p>
			<p>The proposed taxonomy can be used in academic contexts to facilitate teaching and learning or in the business field to favor decision-making when implementing technologies related to virtual machines.</p>
			<p>The taxonomy allows for the classification of VTs present in more than one conceptual branch, as these tools evolve, meeting the needs of more than one approach by themselves or using extensions.</p>
			<p>Finally, a taxonomic key diagram has been created for use by the industry in order to aid the selection of virtualization technologies.</p>
		</sec>
	</body>
	<back>
		<ref-list>
			<title>References</title>
			<ref id="B1">
				<mixed-citation>Abdekhoda, M., Asadi, Z., and Nadrian, H. (2019). Cloud computing services adoption among higher education faculties: Development of a standardized questionnaire. <italic>Education and Information Technologies</italic>, 25(1), 175-191. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s10639-019-09932-0">https://doi.org/10.1007/s10639-019-09932-0</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Abdekhoda</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Asadi</surname>
							<given-names>Z.</given-names>
						</name>
						<name>
							<surname>Nadrian</surname>
							<given-names>H.</given-names>
						</name>
					</person-group>
					<year>2019</year>
					<article-title>Cloud computing services adoption among higher education faculties: Development of a standardized questionnaire</article-title>
					<source>Education and Information Technologies</source>
					<volume>25</volume>
					<issue>1</issue>
					<fpage>175</fpage>
					<lpage>191</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s10639-019-09932-0">https://doi.org/10.1007/s10639-019-09932-0</ext-link>
				</element-citation>
			</ref>
			<ref id="B2">
				<mixed-citation>AbdElRahem, O., Bahaa-Eldin, A. M., and Taha, A. (2016, December 20-21). <italic>Virtualization security: A survey</italic> [Conference presentation]. 2016 11th International Conference on Computer Engineering &amp; Systems (ICCES), Cairo, Egypt. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICCES.2016.7821971">https://doi.org/10.1109/ICCES.2016.7821971</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>AbdElRahem</surname>
							<given-names>O.</given-names>
						</name>
						<name>
							<surname>Bahaa-Eldin</surname>
							<given-names>A. M.</given-names>
						</name>
						<name>
							<surname>Taha</surname>
							<given-names>A.</given-names>
						</name>
					</person-group>
					<year>2016</year>
					<source>Virtualization security: A survey</source>
					<conf-name>11thInternational Conference on Computer Engineering &amp; Systems (ICCES)</conf-name>
					<conf-loc>Cairo, Egypt</conf-loc>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICCES.2016.7821971">https://doi.org/10.1109/ICCES.2016.7821971</ext-link>
				</element-citation>
			</ref>
			<ref id="B3">
				<mixed-citation>Abdulhamid, S. M., Latiff, M. S. A., and Bashir, M. B. (2014). On-demand grid provisioning using cloud infrastructures and related virtualization tools: A survey and taxonomy. <italic>ar-Xivpreprint</italic>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.48550/arXiv.1402.0696">https://doi.org/10.48550/arXiv.1402.0696</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Abdulhamid</surname>
							<given-names>S. M.</given-names>
						</name>
						<name>
							<surname>Latiff</surname>
							<given-names>M. S. A.</given-names>
						</name>
						<name>
							<surname>Bashir</surname>
							<given-names>M. B.</given-names>
						</name>
					</person-group>
					<year>2014</year>
					<source>On-demand grid provisioning using cloud infrastructures and related virtualization tools: A survey and taxonomy</source>
					<publisher-name>ar-Xivpreprint</publisher-name>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.48550/arXiv.1402.0696">https://doi.org/10.48550/arXiv.1402.0696</ext-link>
				</element-citation>
			</ref>
			<ref id="B4">
				<mixed-citation>Abeni, L., and Faggioli, D. (2020). Using Xen and KVM as real-time hypervisors. <italic>Journal of Systems Architecture</italic>, <italic>106</italic>, 101-709. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.sysarc.2020.101709">https://doi.org/10.1016/j.sysarc.2020.101709</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Abeni</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Faggioli</surname>
							<given-names>D.</given-names>
						</name>
					</person-group>
					<year>2020</year>
					<article-title>Using Xen and KVM as real-time hypervisors</article-title>
					<source>Journal of Systems Architecture</source>
					<volume>106</volume>
					<fpage>101</fpage>
					<lpage>709</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.sysarc.2020.101709">https://doi.org/10.1016/j.sysarc.2020.101709</ext-link>
				</element-citation>
			</ref>
			<ref id="B5">
				<mixed-citation>Aceto, G., Botta, A., de Donato, W., and Pescapè, A. (2013). Cloud monitoring: A survey. <italic>Computer Networks</italic>, 57(9), 2093-2115. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.comnet.2013.04.001">https://doi.org/10.1016/j.comnet.2013.04.001</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Aceto</surname>
							<given-names>G.</given-names>
						</name>
						<name>
							<surname>Botta</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>de Donato</surname>
							<given-names>W.</given-names>
						</name>
						<name>
							<surname>Pescapè</surname>
							<given-names>A.</given-names>
						</name>
					</person-group>
					<year>2013</year>
					<article-title>Cloud monitoring: A survey</article-title>
					<source>Computer Networks</source>
					<volume>57</volume>
					<issue>9</issue>
					<fpage>2093</fpage>
					<lpage>2115</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.comnet.2013.04.001">https://doi.org/10.1016/j.comnet.2013.04.001</ext-link>
				</element-citation>
			</ref>
			<ref id="B6">
				<mixed-citation>Adams, K., and Agesen, O. (2006). A comparison of software and hardware techniques for x86 virtualization. <italic>ACM SI-GARCH Computer Architecture News</italic>, <italic>34</italic>(5<italic>),</italic> 2-13. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/1168919.1168860">https://doi.org/10.1145/1168919.1168860</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Adams</surname>
							<given-names>K.</given-names>
						</name>
						<name>
							<surname>Agesen</surname>
							<given-names>O.</given-names>
						</name>
					</person-group>
					<year>2006</year>
					<article-title>A comparison of software and hardware techniques for x86 virtualization</article-title>
					<source>ACM SI-GARCH Computer Architecture News</source>
					<volume>34</volume>
					<issue>5</issue>
					<fpage>2</fpage>
					<lpage>13</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/1168919.1168860">https://doi.org/10.1145/1168919.1168860</ext-link>
				</element-citation>
			</ref>
			<ref id="B7">
				<mixed-citation>Ameen, R. Y., and Hamo, A. Y. (2013). Survey of server virtualization. <italic>arXivpreprint</italic>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.48550/arXiv.1304.3557">https://doi.org/10.48550/arXiv.1304.3557</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Ameen</surname>
							<given-names>R. Y.</given-names>
						</name>
						<name>
							<surname>Hamo</surname>
							<given-names>A. Y.</given-names>
						</name>
					</person-group>
					<year>2013</year>
					<source>Survey of server virtualization</source>
					<publisher-name>arXivpreprint</publisher-name>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.48550/arXiv.1304.3557">https://doi.org/10.48550/arXiv.1304.3557</ext-link>
				</element-citation>
			</ref>
			<ref id="B8">
				<mixed-citation>Annapareddy, N. D. R. (2011). <italic>An approach to storage virtualization</italic>. Texas A &amp; M University-Kingsville.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Annapareddy</surname>
							<given-names>N. D. R.</given-names>
						</name>
					</person-group>
					<year>2011</year>
					<source>An approach to storage virtualization</source>
					<publisher-name>Texas A &amp; M University-Kingsville</publisher-name>
				</element-citation>
			</ref>
			<ref id="B9">
				<mixed-citation>Apple Inc. (2009). <italic>Universal binary programming guidelines</italic>. <ext-link ext-link-type="uri" xlink:href="https://web.archive.org/web/20120327121744/http://develo-per.apple.com/legacy/mac/library/documentation/MacOSX/Conceptual/universal_binary/universal_binary.pdf">https://web.archive.org/web/20120327121744/http://develo-per.apple.com/legacy/mac/library/documentation/MacOSX/Conceptual/universal_binary/universal_binary.pdf</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Apple Inc</collab>
					</person-group>
					<year>2009</year>
					<source>Universal binary programming guidelines</source>
					<ext-link ext-link-type="uri" xlink:href="https://web.archive.org/web/20120327121744/http://develo-per.apple.com/legacy/mac/library/documentation/MacOSX/Conceptual/universal_binary/universal_binary.pdf">https://web.archive.org/web/20120327121744/http://develo-per.apple.com/legacy/mac/library/documentation/MacOSX/Conceptual/universal_binary/universal_binary.pdf</ext-link>
				</element-citation>
			</ref>
			<ref id="B10">
				<mixed-citation>Armand, F., and Gien, M. (2009, January 10-13). <italic>A practical look at micro-kernels and virtual machine monitors</italic> [Conference presentation]. 2009 6th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA.. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/CCNC.2009.4784874">https://doi.org/10.1109/CCNC.2009.4784874</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Armand</surname>
							<given-names>F.</given-names>
						</name>
						<name>
							<surname>Gien</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<year>2009</year>
					<source>A practical look at micro-kernels and virtual machine monitors</source>
					<conf-sponsor>IEEE</conf-sponsor>
					<conf-name>6thConsumer Communications and Networking Conference</conf-name>
					<conf-loc>Las Vegas, NV, USA</conf-loc>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/CCNC.2009.4784874">https://doi.org/10.1109/CCNC.2009.4784874</ext-link>
				</element-citation>
			</ref>
			<ref id="B11">
				<mixed-citation>Bala, V., Duesterwald, E., and Banerjia, S. (2011). Dynamo: a transparent dynamic optimization system. <italic>ACM SIGPLAN Notices</italic>, 46(4), 41-52. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/1988042.1988044">https://doi.org/10.1145/1988042.1988044</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Bala</surname>
							<given-names>V.</given-names>
						</name>
						<name>
							<surname>Duesterwald</surname>
							<given-names>E.</given-names>
						</name>
						<name>
							<surname>Banerjia</surname>
							<given-names>S.</given-names>
						</name>
					</person-group>
					<year>2011</year>
					<article-title>Dynamo: a transparent dynamic optimization system</article-title>
					<source>ACM SIGPLAN Notices</source>
					<volume>46</volume>
					<issue>4</issue>
					<fpage>41</fpage>
					<lpage>52</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/1988042.1988044">https://doi.org/10.1145/1988042.1988044</ext-link>
				</element-citation>
			</ref>
			<ref id="B12">
				<mixed-citation>Balis, B., Antonelli, L., Bracciali, A., Gruber, T., Hyun-Wook, J., Kuhn, M., Scott, S., Unat, D., Wyrzykowski, R., and Eiling, N. (2021, August 24-25). <italic>An open-source virtualization layer for CUDA applications</italic> [Conference presentation]. Europar 2020: Parallel Processing, Warsaw, Poland.</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Balis</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Antonelli</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Bracciali</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Gruber</surname>
							<given-names>T.</given-names>
						</name>
						<name>
							<surname>Hyun-Wook</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Kuhn</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Scott</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Unat</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Wyrzykowski</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Eiling</surname>
							<given-names>N.</given-names>
						</name>
					</person-group>
					<year>2021</year>
					<source>An open-source virtualization layer for CUDA applications</source>
					<conf-name>Europar 2020: Parallel Processing</conf-name>
					<conf-loc>Warsaw, Poland</conf-loc>
				</element-citation>
			</ref>
			<ref id="B13">
				<mixed-citation>Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., and Warfield, A. (2003). Xen and the art of virtualization. In ACM (Eds.), <italic>Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles</italic> (pp. 164-177). ACM. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/945445.945462">https://doi.org/10.1145/945445.945462</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Barham</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Dragovic</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Fraser</surname>
							<given-names>K.</given-names>
						</name>
						<name>
							<surname>Hand</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Harris</surname>
							<given-names>T.</given-names>
						</name>
						<name>
							<surname>Ho</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Neugebauer</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Pratt</surname>
							<given-names>I.</given-names>
						</name>
						<name>
							<surname>Warfield</surname>
							<given-names>A.</given-names>
						</name>
					</person-group>
					<year>2003</year>
					<chapter-title>Xen and the art of virtualization</chapter-title>
					<person-group person-group-type="editor">
						<collab>ACM</collab>
					</person-group>
					<source>Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles</source>
					<fpage>164</fpage>
					<lpage>177</lpage>
					<publisher-name>ACM</publisher-name>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/945445.945462">https://doi.org/10.1145/945445.945462</ext-link>
				</element-citation>
			</ref>
			<ref id="B14">
				<mixed-citation>Beronić, D., Pufek, P., Mihaljevic, B., and Radovan, A. (2021). <italic>On analyzing virtual threads - A structured concurrency model for scalable applications on the JVM</italic> [Conference presentation]. 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO). Opatija, Croatia. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.23919/MI-PRO52101.2021.9596855">https://doi.org/10.23919/MI-PRO52101.2021.9596855</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Beronić</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Pufek</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Mihaljevic</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Radovan</surname>
							<given-names>A.</given-names>
						</name>
					</person-group>
					<year>2021</year>
					<source>On analyzing virtual threads - A structured concurrency model for scalable applications on the JVM</source>
					<conf-name>44thInternational Convention on Information, Communication and Electronic Technology (MIPRO)</conf-name>
					<conf-loc>Opatija, Croatia</conf-loc>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.23919/MI-PRO52101.2021.9596855">https://doi.org/10.23919/MI-PRO52101.2021.9596855</ext-link>
				</element-citation>
			</ref>
			<ref id="B15">
				<mixed-citation>Biederman, E. W. (2006). <italic>Multiple instances of the Global Linux Namespaces</italic> [Conference presentation]. Linux Symposium, Ottawa, Ontario, Canada.</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Biederman</surname>
							<given-names>E. W.</given-names>
						</name>
					</person-group>
					<year>2006</year>
					<source>Multiple instances of the Global Linux Namespaces</source>
					<conf-name>Conference presentation</conf-name>
					<conf-loc>Ottawa, Ontario, Canada</conf-loc>
				</element-citation>
			</ref>
			<ref id="B16">
				<mixed-citation>Bochs (2021). <italic>bochs.</italic> 
 <italic>The cross Platform IA-32 Emulator</italic>. <ext-link ext-link-type="uri" xlink:href="https://bochs.sourceforge.io">https://bochs.sourceforge.io</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Bochs</collab>
					</person-group>
					<year>2021</year>
					<source>The cross Platform IA-32 Emulator</source>
					<ext-link ext-link-type="uri" xlink:href="https://bochs.sourceforge.io">https://bochs.sourceforge.io</ext-link>
				</element-citation>
			</ref>
			<ref id="B17">
				<mixed-citation>Bugnion, E., Nieh, J., Tsafrir, D., and Martonosi, M. (2017). <italic>Hardware and software support for virtualization</italic>. Morgan &amp; Claypool. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2200/S00754ED1V01Y-201701CAC038">https://doi.org/10.2200/S00754ED1V01Y-201701CAC038</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Bugnion</surname>
							<given-names>E.</given-names>
						</name>
						<name>
							<surname>Nieh</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Tsafrir</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Martonosi</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<year>2017</year>
					<source>Hardware and software support for virtualization</source>
					<publisher-name>Morgan &amp; Claypool</publisher-name>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2200/S00754ED1V01Y-201701CAC038">https://doi.org/10.2200/S00754ED1V01Y-201701CAC038</ext-link>
				</element-citation>
			</ref>
			<ref id="B18">
				<mixed-citation>Cafaro, M., and Aloisio, G. (2011). Grids, clouds, and virtualization. In M. Cafaro and G. Aloisio (Eds.), <italic>Grids, Clouds and Virtualization</italic> (pp. 1-21). Springer.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Cafaro</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Aloisio</surname>
							<given-names>G.</given-names>
						</name>
					</person-group>
					<year>2011</year>
					<chapter-title>Grids, clouds, and virtualization</chapter-title>
					<person-group person-group-type="editor">
						<name>
							<surname>Cafaro</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Aloisio</surname>
							<given-names>G.</given-names>
						</name>
					</person-group>
					<source>Grids, Clouds and Virtualization</source>
					<fpage>1</fpage>
					<lpage>21</lpage>
					<publisher-name>Springer</publisher-name>
				</element-citation>
			</ref>
			<ref id="B19">
				<mixed-citation>Canonical Ltd. (2021). <italic>Container and virtualization tools</italic>. <ext-link ext-link-type="uri" xlink:href="https://linuxcontainers.org">https://linuxcontainers.org</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Canonical Ltd</collab>
					</person-group>
					<year>2021</year>
					<source>Container and virtualization tools</source>
					<ext-link ext-link-type="uri" xlink:href="https://linuxcontainers.org">https://linuxcontainers.org</ext-link>
				</element-citation>
			</ref>
			<ref id="B20">
				<mixed-citation>Chang, Y. T. S., Heistand, S., Hood, R., and Jin, H. (2021, November 14). <italic>Feasibility of running singularity containers with hybrid MPI on NASA high-end computing resources</italic> [Conference presentation]. 2021 3rd International Workshop on Containers and New Orchestration Paradigms for Isolated Environments in HPC (CANOPIE-HPC), St. Louis, MO, USA. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/CANOPIEHPC54579.2021.00007">https://doi.org/10.1109/CANOPIEHPC54579.2021.00007</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Chang</surname>
							<given-names>Y. T. S.</given-names>
						</name>
						<name>
							<surname>Heistand</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Hood</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Jin</surname>
							<given-names>H.</given-names>
						</name>
					</person-group>
					<year>2021</year>
					<source>Feasibility of running singularity containers with hybrid MPI on NASA high-end computing resources</source>
					<conf-date>2021</conf-date>
					<conf-name>3rdInternational Workshop on Containers and New Orchestration Paradigms for Isolated Environments in HPC (CANOPIE-HPC)</conf-name>
					<conf-loc>St. Louis, MO, USA</conf-loc>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/CANOPIEHPC54579.2021.00007">https://doi.org/10.1109/CANOPIEHPC54579.2021.00007</ext-link>
				</element-citation>
			</ref>
			<ref id="B21">
				<mixed-citation>Chernoff, A., Herdeg, M., Hookway, R., Reeve, C., Rubin, N., Tye, T., Bharadwaj Yadavalli, S., and Yates, J. (1998). FX! 32: A profile-directed binary translator. <italic>IEEE Micro</italic>, 18(2), 56-64. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/40.671403">https://doi.org/10.1109/40.671403</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Chernoff</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Herdeg</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Hookway</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Reeve</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Rubin</surname>
							<given-names>N.</given-names>
						</name>
						<name>
							<surname>Tye</surname>
							<given-names>T.</given-names>
						</name>
						<name>
							<surname>Bharadwaj Yadavalli</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Yates</surname>
							<given-names>J.</given-names>
						</name>
					</person-group>
					<year>1998</year>
					<article-title>FX! 32: A profile-directed binary translator</article-title>
					<source>IEEE Micro</source>
					<volume>18</volume>
					<issue>2</issue>
					<fpage>56</fpage>
					<lpage>64</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/40.671403">https://doi.org/10.1109/40.671403</ext-link>
				</element-citation>
			</ref>
			<ref id="B22">
				<mixed-citation>Diaz, E., Mateos, R., Bueno, E. J., and Nieto, R. (2021). Enabling parallelized-QEMU for hardware/software co-simulation virtual platforms. <italic>Electronics</italic>, 10(6), 759. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/electronics10060759">https://doi.org/10.3390/electronics10060759</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Diaz</surname>
							<given-names>E.</given-names>
						</name>
						<name>
							<surname>Mateos</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Bueno</surname>
							<given-names>E. J.</given-names>
						</name>
						<name>
							<surname>Nieto</surname>
							<given-names>R.</given-names>
						</name>
					</person-group>
					<year>2021</year>
					<article-title>Enabling parallelized-QEMU for hardware/software co-simulation virtual platforms</article-title>
					<source>Electronics</source>
					<volume>10</volume>
					<issue>6</issue>
					<fpage>759</fpage>
					<lpage>759</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/electronics10060759">https://doi.org/10.3390/electronics10060759</ext-link>
				</element-citation>
			</ref>
			<ref id="B23">
				<mixed-citation>Dike, J. (2006). <italic>User mode linux</italic> (vol. 2). Prentice Hall Englewood Cliffs.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Dike</surname>
							<given-names>J.</given-names>
						</name>
					</person-group>
					<year>2006</year>
					<source>User mode linux</source>
					<volume>2</volume>
					<publisher-name>Prentice Hall Englewood Cliffs</publisher-name>
				</element-citation>
			</ref>
			<ref id="B24">
				<mixed-citation>Docker (2022). <italic>Docker</italic>. <ext-link ext-link-type="uri" xlink:href="https://www.docker.com">https://www.docker.com</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Docker</collab>
					</person-group>
					<year>2022</year>
					<source>Docker</source>
					<ext-link ext-link-type="uri" xlink:href="https://www.docker.com">https://www.docker.com</ext-link>
				</element-citation>
			</ref>
			<ref id="B25">
				<mixed-citation>El-Anani, B. R. (2021). <italic>Server virtualization: Para- and full virtualization: XenServer vs</italic>. <italic>KVM</italic>. <ext-link ext-link-type="uri" xlink:href="https://www.theseus.fi/hand-le/10024/5072 77">https://www.theseus.fi/hand-le/10024/5072 77</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>El-Anani</surname>
							<given-names>B. R.</given-names>
						</name>
					</person-group>
					<year>2021</year>
					<source>Server virtualization: Para- and full virtualization: XenServer vs</source>
					<publisher-name>KVM</publisher-name>
					<ext-link ext-link-type="uri" xlink:href="https://www.theseus.fi/hand-le/10024/5072 77">https://www.theseus.fi/hand-le/10024/5072 77</ext-link>
				</element-citation>
			</ref>
			<ref id="B26">
				<mixed-citation>Ensim (2022). <italic>Ensim</italic>. <ext-link ext-link-type="uri" xlink:href="http://www.ensim.com">http://www.ensim.com</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Ensim</collab>
					</person-group>
					<year>2022</year>
					<source>Ensim</source>
					<ext-link ext-link-type="uri" xlink:href="http://www.ensim.com">http://www.ensim.com</ext-link>
				</element-citation>
			</ref>
			<ref id="B27">
				<mixed-citation>eWeek. (2008). <italic>IBM acquiring transitive to increase virtualization capabilities of power systems</italic>. <ext-link ext-link-type="uri" xlink:href="https://www.eweek.com/virtualization/ibm-acquiring-transitive-to-increase-virtuali-zation-capabilities-of-power-systems/">https://www.eweek.com/virtualization/ibm-acquiring-transitive-to-increase-virtuali-zation-capabilities-of-power-systems/</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>eWeek</collab>
					</person-group>
					<year>2008</year>
					<source>IBM acquiring transitive to increase virtualization capabilities of power systems</source>
					<ext-link ext-link-type="uri" xlink:href="https://www.eweek.com/virtualization/ibm-acquiring-transitive-to-increase-virtuali-zation-capabilities-of-power-systems/">https://www.eweek.com/virtualization/ibm-acquiring-transitive-to-increase-virtuali-zation-capabilities-of-power-systems/</ext-link>
				</element-citation>
			</ref>
			<ref id="B28">
				<mixed-citation>Fareghzadeh, N., Seyyedi, M. A., and Mohsenzadeh, M. (2019). Toward holistic performance management in clouds: taxonomy, challenges and opportunities. <italic>Journal of Supercomputing</italic>, 75(1), 272-313. <ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1007/s11227-018-2679-9">http://doi.org/10.1007/s11227-018-2679-9</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Fareghzadeh</surname>
							<given-names>N.</given-names>
						</name>
						<name>
							<surname>Seyyedi</surname>
							<given-names>M. A.</given-names>
						</name>
						<name>
							<surname>Mohsenzadeh</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<year>2019</year>
					<article-title>Toward holistic performance management in clouds: taxonomy, challenges and opportunities</article-title>
					<source>Journal of Supercomputing</source>
					<volume>75</volume>
					<issue>1</issue>
					<fpage>272</fpage>
					<lpage>313</lpage>
					<ext-link ext-link-type="uri" xlink:href="http://doi.org/10.1007/s11227-018-2679-9">http://doi.org/10.1007/s11227-018-2679-9</ext-link>
				</element-citation>
			</ref>
			<ref id="B29">
				<mixed-citation>Fisher, M., Sharma, S., Lai, R., and Moroney, L. (2006). <italic>Java EE and .NET interoperability: Integration strategies, patterns, and best practices</italic>. Prentice Hall Professional.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Fisher</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Sharma</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Lai</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Moroney</surname>
							<given-names>L.</given-names>
						</name>
					</person-group>
					<year>2006</year>
					<source>Java EE and .NET interoperability: Integration strategies, patterns, and best practices</source>
					<publisher-name>Prentice Hall Professional</publisher-name>
				</element-citation>
			</ref>
			<ref id="B30">
				<mixed-citation>Ford, B., and Cox, R. (2008). <italic>Vx32: Lightweight User-level Sandboxing on the x86</italic> [Conference presentation]. USENIX Annual Technical Conference. <ext-link ext-link-type="uri" xlink:href="https://www.usenix.org/legacy/events/usenix08/tech/full_papers/ford/ford.pdf">https://www.usenix.org/legacy/events/usenix08/tech/full_papers/ford/ford.pdf</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Ford</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Cox</surname>
							<given-names>R.</given-names>
						</name>
					</person-group>
					<year>2008</year>
					<source>Vx32: Lightweight User-level Sandboxing on the x86</source>
					<conf-sponsor>USENIX</conf-sponsor>
					<conf-name>Annual Technical Conference</conf-name>
					<ext-link ext-link-type="uri" xlink:href="https://www.usenix.org/legacy/events/usenix08/tech/full_papers/ford/ford.pdf">https://www.usenix.org/legacy/events/usenix08/tech/full_papers/ford/ford.pdf</ext-link>
				</element-citation>
			</ref>
			<ref id="B31">
				<mixed-citation>Gibson, C. (2007). WPAR Power AIX workload partition explained. <italic>IBM Systems Magazine</italic>. <ext-link ext-link-type="uri" xlink:href="http://www.ibmsystemsmag.com/opensystems/december07/coverstory/18606p1.aspx">http://www.ibmsystemsmag.com/opensystems/december07/coverstory/18606p1.aspx</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Gibson</surname>
							<given-names>C.</given-names>
						</name>
					</person-group>
					<year>2007</year>
					<source>WPAR Power AIX workload partition explained</source>
					<publisher-name>IBM Systems Magazine</publisher-name>
					<ext-link ext-link-type="uri" xlink:href="http://www.ibmsystemsmag.com/opensystems/december07/coverstory/18606p1.aspx">http://www.ibmsystemsmag.com/opensystems/december07/coverstory/18606p1.aspx</ext-link>
				</element-citation>
			</ref>
			<ref id="B32">
				<mixed-citation>Goldberg, R. P. (1973). <italic>Architectural principles for virtual computer systems</italic>. Defense Technical Information Center.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Goldberg</surname>
							<given-names>R. P.</given-names>
						</name>
					</person-group>
					<year>1973</year>
					<source>Architectural principles for virtual computer systems</source>
					<publisher-name>Defense Technical Information Center</publisher-name>
				</element-citation>
			</ref>
			<ref id="B33">
				<mixed-citation>Goldberg, R. P. (1974). Survey of virtual machine research. <italic>Computer</italic>, 7(6), 34-45. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/MC.1974.6323581">https://doi.org/10.1109/MC.1974.6323581</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Goldberg</surname>
							<given-names>R. P.</given-names>
						</name>
					</person-group>
					<year>1974</year>
					<article-title>Survey of virtual machine research</article-title>
					<source>Computer</source>
					<volume>7</volume>
					<issue>6</issue>
					<fpage>34</fpage>
					<lpage>45</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/MC.1974.6323581">https://doi.org/10.1109/MC.1974.6323581</ext-link>
				</element-citation>
			</ref>
			<ref id="B34">
				<mixed-citation>Honeycutt, J. (2003). <italic>Microsoft virtual PC 2004 technical overview</italic>. Microsoft.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Honeycutt</surname>
							<given-names>J.</given-names>
						</name>
					</person-group>
					<year>2003</year>
					<source>Microsoft virtual PC 2004 technical overview</source>
					<publisher-name>Microsoft</publisher-name>
				</element-citation>
			</ref>
			<ref id="B35">
				<mixed-citation>Hoopes, J. (2009). <italic>Virtualization for security: Including sandbo-xing, disaster recovery, high availability, forensic analysis, and honeypotting</italic>. Syngress.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Hoopes</surname>
							<given-names>J.</given-names>
						</name>
					</person-group>
					<year>2009</year>
					<source>Virtualization for security: Including sandbo-xing, disaster recovery, high availability, forensic analysis, and honeypotting</source>
					<publisher-name>Syngress</publisher-name>
				</element-citation>
			</ref>
			<ref id="B36">
				<mixed-citation>Hui, L. Y., and Seok, K. H. (2014). A study of savings of power consumption and server space through integrated virtualization of UNIX servers. <italic>International Journal of Software Engineering and Its Applications</italic>, 8(5), 219-230. <ext-link ext-link-type="uri" xlink:href="http://dx.doi.org/10.14257/ijseia.2014.8.5.17">http://dx.doi.org/10.14257/ijseia.2014.8.5.17</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Hui</surname>
							<given-names>L. Y.</given-names>
						</name>
						<name>
							<surname>Seok</surname>
							<given-names>K. H.</given-names>
						</name>
					</person-group>
					<year>2014</year>
					<article-title>A study of savings of power consumption and server space through integrated virtualization of UNIX servers</article-title>
					<source>International Journal of Software Engineering and Its Applications</source>
					<volume>8</volume>
					<issue>5</issue>
					<fpage>219</fpage>
					<lpage>230</lpage>
					<ext-link ext-link-type="uri" xlink:href="http://dx.doi.org/10.14257/ijseia.2014.8.5.17">http://dx.doi.org/10.14257/ijseia.2014.8.5.17</ext-link>
				</element-citation>
			</ref>
			<ref id="B37">
				<mixed-citation>IBM (2008). <italic>Transitive</italic>. <ext-link ext-link-type="uri" xlink:href="https://www03.ibm.com/press/us/en/pressrelease/26106.wss">https://www03.ibm.com/press/us/en/pressrelease/26106.wss</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>IBM</collab>
					</person-group>
					<year>2008</year>
					<source>Transitive</source>
					<ext-link ext-link-type="uri" xlink:href="https://www03.ibm.com/press/us/en/pressrelease/26106.wss">https://www03.ibm.com/press/us/en/pressrelease/26106.wss</ext-link>
				</element-citation>
			</ref>
			<ref id="B38">
				<mixed-citation>Jason, K., Velte, A., and Velte, T. (2009). <italic>Microsoft virtualization with Hyper-V</italic>. McGraw-Hill, Inc.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Jason</surname>
							<given-names>K.</given-names>
						</name>
						<name>
							<surname>Velte</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Velte</surname>
							<given-names>T.</given-names>
						</name>
					</person-group>
					<year>2009</year>
					<source>Microsoft virtualization with Hyper-V</source>
					<publisher-name>McGraw-Hill, Inc</publisher-name>
				</element-citation>
			</ref>
			<ref id="B39">
				<mixed-citation>Jing, S.-Y., Ali, S., She, K., and Zhong, Y. (2013). State-of-the-art research study for green cloud computing. <italic>The Journal of Supercomputing</italic>, 65(1), 445-468. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s11227-011-0722-1">https://doi.org/10.1007/s11227-011-0722-1</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Jing</surname>
							<given-names>S.-Y.</given-names>
						</name>
						<name>
							<surname>Ali</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>She</surname>
							<given-names>K.</given-names>
						</name>
						<name>
							<surname>Zhong</surname>
							<given-names>Y.</given-names>
						</name>
					</person-group>
					<year>2013</year>
					<article-title>State-of-the-art research study for green cloud computing</article-title>
					<source>The Journal of Supercomputing</source>
					<volume>65</volume>
					<issue>1</issue>
					<fpage>445</fpage>
					<lpage>468</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s11227-011-0722-1">https://doi.org/10.1007/s11227-011-0722-1</ext-link>
				</element-citation>
			</ref>
			<ref id="B40">
				<mixed-citation>Jones, M., Kepner, J., Orchard, B., Reuther, A., Arcand, W., Bes-tor, D., Bergeron, B., Byun, C., Gadepally, V., Houle, M., Hubbell, M., Klein, A., Milechin, L., Mullen, J., Prout, A., Rosa, A., Samsi, S., Yee, C., and Michaleas, P. (2018, September 25-27). <italic>Interactive launch of 16,000 Microsoft Windows Instances on a supercomputer</italic> [Conference presentation]. 2018 IEEE High Performance extreme Computing Conference (HPEC), Waltham, MA, USA. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/HPEC.2018.8547782">https://doi.org/10.1109/HPEC.2018.8547782</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Jones</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Kepner</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Orchard</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Reuther</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Arcand</surname>
							<given-names>W.</given-names>
						</name>
						<name>
							<surname>Bes-tor</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Bergeron</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Byun</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Gadepally</surname>
							<given-names>V.</given-names>
						</name>
						<name>
							<surname>Houle</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Hubbell</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Klein</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Milechin</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Mullen</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Prout</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Rosa</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Samsi</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Yee</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Michaleas</surname>
							<given-names>P.</given-names>
						</name>
					</person-group>
					<year>2018</year>
					<source>Interactive launch of 16,000 Microsoft Windows Instances on a supercomputer</source>
					<conf-date>2018</conf-date>
					<conf-sponsor>IEEE</conf-sponsor>
					<conf-name>High Performance extreme Computing Conference (HPEC)</conf-name>
					<conf-loc>Waltham, MA, USA</conf-loc>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/HPEC.2018.8547782">https://doi.org/10.1109/HPEC.2018.8547782</ext-link>
				</element-citation>
			</ref>
			<ref id="B41">
				<mixed-citation>Kamp, P.-H., and Watson, R. N. (2000). <italic>Jails: Confining the omnipotent root</italic> [Conference presentation]. 2nd International SANE Conference. <ext-link ext-link-type="uri" xlink:href="https://papers.freebsd.org/2000/phk-jails/">https://papers.freebsd.org/2000/phk-jails/</ext-link>
				</mixed-citation>
				<element-citation publication-type="thesis">
					<person-group person-group-type="author">
						<name>
							<surname>Kamp</surname>
							<given-names>P.-H.</given-names>
						</name>
						<name>
							<surname>Watson</surname>
							<given-names>R. N.</given-names>
						</name>
					</person-group>
					<year>2000</year>
					<source>Jails: Confining the omnipotent root</source>
					<conf-name>2ndInternational SANE Conference</conf-name>
					<ext-link ext-link-type="uri" xlink:href="https://papers.freebsd.org/2000/phk-jails/">https://papers.freebsd.org/2000/phk-jails/</ext-link>
				</element-citation>
			</ref>
			<ref id="B42">
				<mixed-citation>Kampert, P. (2010). <italic>A taxonomy of virtualization technologies</italic>. [Master's thesis, Delft University of Technology]. <ext-link ext-link-type="uri" xlink:href="https://d1rkab7tlqy5f1.cloudfront.net/TBM/Over%20faculteit/Afde-lingen/Engineering%20Systems%20and%20Services/People/Professors%20emeriti/Jan%20van%20den%20Berg/MasterPh-dThesis/Masters_Thesis_Paulus_Kampert_August_2010-2.pdf">https://d1rkab7tlqy5f1.cloudfront.net/TBM/Over%20faculteit/Afde-lingen/Engineering%20Systems%20and%20Services/People/Professors%20emeriti/Jan%20van%20den%20Berg/MasterPh-dThesis/Masters_Thesis_Paulus_Kampert_August_2010-2.pdf </ext-link>
				</mixed-citation>
				<element-citation publication-type="thesis">
					<person-group person-group-type="author">
						<name>
							<surname>Kampert</surname>
							<given-names>P.</given-names>
						</name>
					</person-group>
					<year>2010</year>
					<source>A taxonomy of virtualization technologies</source>
					<comment content-type="degree">Master's thesis</comment>
					<publisher-name>Delft University of Technology</publisher-name>
					<ext-link ext-link-type="uri" xlink:href="https://d1rkab7tlqy5f1.cloudfront.net/TBM/Over%20faculteit/Afde-lingen/Engineering%20Systems%20and%20Services/People/Professors%20emeriti/Jan%20van%20den%20Berg/MasterPh-dThesis/Masters_Thesis_Paulus_Kampert_August_2010-2.pdf">https://d1rkab7tlqy5f1.cloudfront.net/TBM/Over%20faculteit/Afde-lingen/Engineering%20Systems%20and%20Services/People/Professors%20emeriti/Jan%20van%20den%20Berg/MasterPh-dThesis/Masters_Thesis_Paulus_Kampert_August_2010-2.pdf </ext-link>
				</element-citation>
			</ref>
			<ref id="B43">
				<mixed-citation>Kusnetzky, D. (2011). <italic>Virtualization: A manager's guide</italic>. O'Reilly Media, Inc.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Kusnetzky</surname>
							<given-names>D.</given-names>
						</name>
					</person-group>
					<year>2011</year>
					<source>Virtualization: A manager's guide</source>
					<publisher-name>O'Reilly Media, Inc</publisher-name>
				</element-citation>
			</ref>
			<ref id="B44">
				<mixed-citation>KVM (2021). <italic>Kernel Virtual Machine</italic>. <ext-link ext-link-type="uri" xlink:href="https://www.linux-kvm.org">https://www.linux-kvm.org</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>KVM</collab>
					</person-group>
					<year>2021</year>
					<source>Kernel Virtual Machine</source>
					<ext-link ext-link-type="uri" xlink:href="https://www.linux-kvm.org">https://www.linux-kvm.org</ext-link>
				</element-citation>
			</ref>
			<ref id="B45">
				<mixed-citation>Li, B., Shu, J., and Zheng, W. (2005). Design and implementation of a storage virtualization system based on SCSI target simulator in SAN. <italic>Tsinghua Science and Technology</italic>, 10(1), 122-127. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/S1007-0214(05)70018-3">https://doi.org/10.1016/S1007-0214(05)70018-3</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Li</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Shu</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Zheng</surname>
							<given-names>W.</given-names>
						</name>
					</person-group>
					<year>2005</year>
					<article-title>Design and implementation of a storage virtualization system based on SCSI target simulator in SAN</article-title>
					<source>Tsinghua Science and Technology</source>
					<volume>10</volume>
					<issue>1</issue>
					<fpage>122</fpage>
					<lpage>127</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/S1007-0214(05)70018-3">https://doi.org/10.1016/S1007-0214(05)70018-3</ext-link>
				</element-citation>
			</ref>
			<ref id="B46">
				<mixed-citation>Li, X.-F. (2016). <italic>Advanced design and implementation of virtual machines</italic>. CRC Press.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Li</surname>
							<given-names>X.-F.</given-names>
						</name>
					</person-group>
					<year>2016</year>
					<source>Advanced design and implementation of virtual machines</source>
					<publisher-name>CRC Press</publisher-name>
				</element-citation>
			</ref>
			<ref id="B47">
				<mixed-citation>Li, Z. (2021, November 12-14). <italic>Comparison between common virtualization solutions: VMware Workstation, Hyper-V and Docker</italic> [Conference presentation]. 2021 IEEE 3rd International Conference on Frontiers Technology of Information and Computer (ICFTIC), Greenville, SC, USA. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICFTIC54370.2021.9647226">https://doi.org/10.1109/ICFTIC54370.2021.9647226</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Li</surname>
							<given-names>Z.</given-names>
						</name>
					</person-group>
					<season>,No-14</season>
					<year>2021,</year>
					<source>Comparison between common virtualization solutions: VMware Workstation, Hyper-V and Docker</source>
					<conf-date>2021</conf-date>
					<conf-sponsor>IEEE</conf-sponsor>
					<conf-name>3rdInternational Conference on Frontiers Technology of Information and Computer (ICFTIC)</conf-name>
					<conf-loc>Greenville, SC, USA</conf-loc>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICFTIC54370.2021.9647226">https://doi.org/10.1109/ICFTIC54370.2021.9647226</ext-link>
				</element-citation>
			</ref>
			<ref id="B48">
				<mixed-citation>Lin, Q., Qi, Z., Wu, J., Dong, Y., and Guan, H. (2012). Optimizing virtual machines using hybrid virtualization. <italic>Journal of Systems and Software</italic>, 85(11), 2593-2603. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.jss.2012.05.093">https://doi.org/10.1016/j.jss.2012.05.093</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Lin</surname>
							<given-names>Q.</given-names>
						</name>
						<name>
							<surname>Qi</surname>
							<given-names>Z.</given-names>
						</name>
						<name>
							<surname>Wu</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Dong</surname>
							<given-names>Y.</given-names>
						</name>
						<name>
							<surname>Guan</surname>
							<given-names>H.</given-names>
						</name>
					</person-group>
					<year>2012</year>
					<article-title>Optimizing virtual machines using hybrid virtualization</article-title>
					<source>Journal of Systems and Software</source>
					<volume>85</volume>
					<issue>11</issue>
					<fpage>2593</fpage>
					<lpage>2603</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.jss.2012.05.093">https://doi.org/10.1016/j.jss.2012.05.093</ext-link>
				</element-citation>
			</ref>
			<ref id="B49">
				<mixed-citation>Lin, S., Hao, C., and Jianhua, S. (2009, May 23-29). <italic>VCUDA: GPU accelerated high performance computing in virtual machines</italic> [Conference presentation]. 2009 IEEE International Symposium on Parallel &amp; Distributed Processing, Rome, Italy. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/IPDPS.2009.5161020">https://doi.org/10.1109/IPDPS.2009.5161020</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Lin</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Hao</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Jianhua</surname>
							<given-names>S.</given-names>
						</name>
					</person-group>
					<year>2009</year>
					<source>VCUDA: GPU accelerated high performance computing in virtual machines</source>
					<conf-date>2009</conf-date>
					<conf-sponsor>IEEE</conf-sponsor>
					<conf-name>International Symposium on Parallel &amp; Distributed Processing</conf-name>
					<conf-loc>Rome, Italy</conf-loc>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/IPDPS.2009.5161020">https://doi.org/10.1109/IPDPS.2009.5161020</ext-link>
				</element-citation>
			</ref>
			<ref id="B50">
				<mixed-citation>Lindholm, T., Yellin, F., Bracha, G., and Buckley, A. (1997). <italic>The Java virtual machine specification</italic>. Addison-Wesley.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Lindholm</surname>
							<given-names>T.</given-names>
						</name>
						<name>
							<surname>Yellin</surname>
							<given-names>F.</given-names>
						</name>
						<name>
							<surname>Bracha</surname>
							<given-names>G.</given-names>
						</name>
						<name>
							<surname>Buckley</surname>
							<given-names>A.</given-names>
						</name>
					</person-group>
					<year>1997</year>
					<source>The Java virtual machine specification</source>
					<publisher-name>Addison-Wesley</publisher-name>
				</element-citation>
			</ref>
			<ref id="B51">
				<mixed-citation>Linux-VServer (2018). <italic>Linux-VServer</italic>. <ext-link ext-link-type="uri" xlink:href="http://www.linux-vserver.org">http://www.linux-vserver.org</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Linux-VServer</collab>
					</person-group>
					<year>2018</year>
					<source>Linux-VServer</source>
					<ext-link ext-link-type="uri" xlink:href="http://www.linux-vserver.org">http://www.linux-vserver.org</ext-link>
				</element-citation>
			</ref>
			<ref id="B52">
				<mixed-citation>Lxrun (2022, 2008/03/09). <italic>Official lxrun web site</italic>. <ext-link ext-link-type="uri" xlink:href="https://web.archive.org/web/20151025205205/http://www.ugcs.caltech.edu/~steven/lxrun/">https://web.archive.org/web/20151025205205/http://www.ugcs.caltech.edu/~steven/lxrun/</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Lxrun</collab>
					</person-group>
					<year>2022</year>
					<source>Official lxrun web site</source>
					<ext-link ext-link-type="uri" xlink:href="https://web.archive.org/web/20151025205205/http://www.ugcs.caltech.edu/~steven/lxrun/">https://web.archive.org/web/20151025205205/http://www.ugcs.caltech.edu/~steven/lxrun/</ext-link>
				</element-citation>
			</ref>
			<ref id="B53">
				<mixed-citation>Magnusson, P. S., Christensson, M., Eskilson, J., Forsgren, D., Hallberg, G., Hogberg, J., Larsson, F., Moested, A., and Werner, B. (2002). Simics: A full system simulation platform. <italic>Computer</italic>, 35(2), 50-58. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/2.982916">https://doi.org/10.1109/2.982916</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Magnusson</surname>
							<given-names>P. S.</given-names>
						</name>
						<name>
							<surname>Christensson</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Eskilson</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Forsgren</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Hallberg</surname>
							<given-names>G.</given-names>
						</name>
						<name>
							<surname>Hogberg</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Larsson</surname>
							<given-names>F.</given-names>
						</name>
						<name>
							<surname>Moested</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Werner</surname>
							<given-names>B.</given-names>
						</name>
					</person-group>
					<year>2002</year>
					<article-title>Simics: A full system simulation platform</article-title>
					<source>Computer</source>
					<volume>35</volume>
					<issue>2</issue>
					<fpage>50</fpage>
					<lpage>58</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/2.982916">https://doi.org/10.1109/2.982916</ext-link>
				</element-citation>
			</ref>
			<ref id="B54">
				<mixed-citation>Mann, A. (2006). <italic>Virtualization 101: Technologies, benefits, and challenges</italic>. Enterprise Management Associates, Inc.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Mann</surname>
							<given-names>A.</given-names>
						</name>
					</person-group>
					<year>2006</year>
					<source>Virtualization 101: Technologies, benefits, and challenges</source>
					<publisher-name>Enterprise Management Associates, Inc</publisher-name>
				</element-citation>
			</ref>
			<ref id="B55">
				<mixed-citation>Matthews, J. N., Dow, E. M., Deshane, T., Hu, W., Bongio, J., Wilbur, P. F., and Johnson, B. (2008). <italic>Running Xen: A handson guide to the art of virtualization</italic>. Prentice Hall PTR.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Matthews</surname>
							<given-names>J. N.</given-names>
						</name>
						<name>
							<surname>Dow</surname>
							<given-names>E. M.</given-names>
						</name>
						<name>
							<surname>Deshane</surname>
							<given-names>T.</given-names>
						</name>
						<name>
							<surname>Hu</surname>
							<given-names>W.</given-names>
						</name>
						<name>
							<surname>Bongio</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Wilbur</surname>
							<given-names>P. F.</given-names>
						</name>
						<name>
							<surname>Johnson</surname>
							<given-names>B.</given-names>
						</name>
					</person-group>
					<year>2008</year>
					<source>Running Xen: A handson guide to the art of virtualization</source>
					<publisher-name>Prentice Hall PTR</publisher-name>
				</element-citation>
			</ref>
			<ref id="B56">
				<mixed-citation>Nanda, S., and Chiueh, T.-C. (2005). <italic>A survey on virtualization technologies</italic>. Stony Brook University. <ext-link ext-link-type="uri" xlink:href="http://comet.lehman.cuny.edu/cocchi/CMP464/papers/VirtualizationSurveyTR179.pdf">http://comet.lehman.cuny.edu/cocchi/CMP464/papers/VirtualizationSurveyTR179.pdf</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Nanda</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Chiueh</surname>
							<given-names>T.-C.</given-names>
						</name>
					</person-group>
					<year>2005</year>
					<source>A survey on virtualization technologies</source>
					<publisher-name>Stony Brook University</publisher-name>
					<ext-link ext-link-type="uri" xlink:href="http://comet.lehman.cuny.edu/cocchi/CMP464/papers/VirtualizationSurveyTR179.pdf">http://comet.lehman.cuny.edu/cocchi/CMP464/papers/VirtualizationSurveyTR179.pdf</ext-link>
				</element-citation>
			</ref>
			<ref id="B57">
				<mixed-citation>Nanda, S., Li, W., Lam, L.-C., and Chiueh, T.-C. (2006). <italic>BIRD: Binary interpretation using runtime disassembly</italic> [Conference presentation]. 2006 International Symposium on Code Generation and Optimization, New York, NY, USA. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/CGO.2006.6">https://doi.org/10.1109/CGO.2006.6</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Nanda</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Li</surname>
							<given-names>W.</given-names>
						</name>
						<name>
							<surname>Lam</surname>
							<given-names>L.-C.</given-names>
						</name>
						<name>
							<surname>Chiueh</surname>
							<given-names>T.-C.</given-names>
						</name>
					</person-group>
					<year>2006</year>
					<source>BIRD: Binary interpretation using runtime disassembly</source>
					<conf-date>2006</conf-date>
					<conf-name>International Symposium on Code Generation and Optimization</conf-name>
					<conf-loc>New York, NY, USA</conf-loc>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/CGO.2006.6">https://doi.org/10.1109/CGO.2006.6</ext-link>
				</element-citation>
			</ref>
			<ref id="B58">
				<mixed-citation>OpenVZ (2021). <italic>OpenVZ</italic>. <ext-link ext-link-type="uri" xlink:href="https://openvz.org">https://openvz.org</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>OpenVZ</collab>
					</person-group>
					<year>2021</year>
					<source>OpenVZ</source>
					<ext-link ext-link-type="uri" xlink:href="https://openvz.org">https://openvz.org</ext-link>
				</element-citation>
			</ref>
			<ref id="B59">
				<mixed-citation>Oracle (2018). <italic>WABI</italic><ext-link ext-link-type="uri" xlink:href="https://docs.oracle.com/cd/E19957-01/802-6306/802-6306.pdf">https://docs.oracle.com/cd/E19957-01/802-6306/802-6306.pdf</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Oracle</collab>
					</person-group>
					<year>2018</year>
					<source>WABI</source>
					<ext-link ext-link-type="uri" xlink:href="https://docs.oracle.com/cd/E19957-01/802-6306/802-6306.pdf">https://docs.oracle.com/cd/E19957-01/802-6306/802-6306.pdf</ext-link>
				</element-citation>
			</ref>
			<ref id="B60">
				<mixed-citation>Oracle (2021a). <italic>Oracle Solaris Zones</italic>. <ext-link ext-link-type="uri" xlink:href="https://docs.oracle.com/cd/E18440_01/doc.111/e18415/chapter_zones.htm#OP-CUG426">https://docs.oracle.com/cd/E18440_01/doc.111/e18415/chapter_zones.htm#OP-CUG426</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Oracle</collab>
					</person-group>
					<year>2021a</year>
					<source>Oracle Solaris Zones</source>
					<ext-link ext-link-type="uri" xlink:href="https://docs.oracle.com/cd/E18440_01/doc.111/e18415/chapter_zones.htm#OP-CUG426">https://docs.oracle.com/cd/E18440_01/doc.111/e18415/chapter_zones.htm#OP-CUG426</ext-link>
				</element-citation>
			</ref>
			<ref id="B61">
				<mixed-citation>Oracle (2021b). <italic>Oracle Virtual Box</italic>. <ext-link ext-link-type="uri" xlink:href="https://www.oracle.com/vir-tualization/virtualbox/">https://www.oracle.com/vir-tualization/virtualbox/</ext-link>.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Oracle</collab>
					</person-group>
					<year>2021b</year>
					<source>Oracle Virtual Box</source>
					<ext-link ext-link-type="uri" xlink:href="https://www.oracle.com/vir-tualization/virtualbox/">https://www.oracle.com/vir-tualization/virtualbox/</ext-link>
				</element-citation>
			</ref>
			<ref id="B62">
				<mixed-citation>Parallels (2021). <italic>Parallels</italic>. <ext-link ext-link-type="uri" xlink:href="https://www.parallels.com">https://www.parallels.com</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Parallels</collab>
					</person-group>
					<year>2021</year>
					<source>Parallels</source>
					<ext-link ext-link-type="uri" xlink:href="https://www.parallels.com">https://www.parallels.com</ext-link>
				</element-citation>
			</ref>
			<ref id="B63">
				<mixed-citation>Parrot (2022). <italic>Parrot</italic>. <ext-link ext-link-type="uri" xlink:href="http://www.parrot.org">http://www.parrot.org</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Parrot</collab>
					</person-group>
					<year>2022</year>
					<source>Parrot</source>
					<ext-link ext-link-type="uri" xlink:href="http://www.parrot.org">http://www.parrot.org</ext-link>
				</element-citation>
			</ref>
			<ref id="B64">
				<mixed-citation>Pék, G., Buttyán, L., and Bencsáth, B. (2013). A survey of security issues in hardware virtualization. <italic>ACM Computing Surveys (CSUR)</italic>, 45(3), 40. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/2480741.2480757">https://doi.org/10.1145/2480741.2480757</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Pék</surname>
							<given-names>G.</given-names>
						</name>
						<name>
							<surname>Buttyán</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Bencsáth</surname>
							<given-names>B.</given-names>
						</name>
					</person-group>
					<year>2013</year>
					<article-title>A survey of security issues in hardware virtualization</article-title>
					<source>ACM Computing Surveys (CSUR)</source>
					<volume>45</volume>
					<issue>3</issue>
					<fpage>40</fpage>
					<lpage>40</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/2480741.2480757">https://doi.org/10.1145/2480741.2480757</ext-link>
				</element-citation>
			</ref>
			<ref id="B65">
				<mixed-citation>Pessolani, P., and Jara, O. (2011, November 7-11). <italic>Minix over Linux: A user-space multiserver operating system</italic> [Conference presentation]. 2011 Brazilian Symposium on Computing System Engineering, Florianopolis, Brazil. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/SBESC.2011.17">https://doi.org/10.1109/SBESC.2011.17</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Pessolani</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Jara</surname>
							<given-names>O.</given-names>
						</name>
					</person-group>
					<year>2011</year>
					<source>Minix over Linux: A user-space multiserver operating system</source>
					<conf-date>2011</conf-date>
					<conf-name>Brazilian Symposium on Computing System Engineering</conf-name>
					<conf-loc>Florianopolis, Brazil</conf-loc>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/SBESC.2011.17">https://doi.org/10.1109/SBESC.2011.17</ext-link>
				</element-citation>
			</ref>
			<ref id="B66">
				<mixed-citation>Pessolani, P., Gonnet, S. M., Tinetti, F. G., and Cortes, T. (2012). <italic>Sistema de virtualización con recursos distribuidos</italic> [Conference presentation]. XIV Workshop de Investigadores en Ciencias de la Computación. <ext-link ext-link-type="uri" xlink:href="http://sedici.unlp.edu.ar/hand-le/10915/18375">http://sedici.unlp.edu.ar/hand-le/10915/18375</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Pessolani</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Gonnet</surname>
							<given-names>S. M.</given-names>
						</name>
						<name>
							<surname>Tinetti</surname>
							<given-names>F. G.</given-names>
						</name>
						<name>
							<surname>Cortes</surname>
							<given-names>T.</given-names>
						</name>
					</person-group>
					<year>2012</year>
					<source>Sistema de virtualización con recursos distribuidos</source>
					<conf-name>XIVWorkshop de Investigadores en Ciencias de la Computación</conf-name>
					<ext-link ext-link-type="uri" xlink:href="http://sedici.unlp.edu.ar/hand-le/10915/18375">http://sedici.unlp.edu.ar/hand-le/10915/18375</ext-link>
				</element-citation>
			</ref>
			<ref id="B67">
				<mixed-citation>Plex86 (2021). <italic>The new Plex86, x86 Virtual Machine Project</italic>. <ext-link ext-link-type="uri" xlink:href="http://plex86.sourceforge.net">http://plex86.sourceforge.net</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Plex86</collab>
					</person-group>
					<year>2021</year>
					<source>The new Plex86, x86 Virtual Machine Project</source>
					<ext-link ext-link-type="uri" xlink:href="http://plex86.sourceforge.net">http://plex86.sourceforge.net</ext-link>
				</element-citation>
			</ref>
			<ref id="B68">
				<mixed-citation>Popek, G. J., and Goldberg, R. P. (1974). Formal requirements for virtualizable third generation architectures. <italic>Communications of the ACM</italic>, <italic>17</italic>(7), 412-421. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/361011.361073">https://doi.org/10.1145/361011.361073</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Popek</surname>
							<given-names>G. J.</given-names>
						</name>
						<name>
							<surname>Goldberg</surname>
							<given-names>R. P.</given-names>
						</name>
					</person-group>
					<year>1974</year>
					<article-title>Formal requirements for virtualizable third generation architectures</article-title>
					<source>Communications of the ACM</source>
					<volume>17</volume>
					<issue>7</issue>
					<fpage>412</fpage>
					<lpage>421</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/361011.361073">https://doi.org/10.1145/361011.361073</ext-link>
				</element-citation>
			</ref>
			<ref id="B69">
				<mixed-citation>QEMU (2021). <italic>QEMU, the FAST! processor emulator</italic>. <ext-link ext-link-type="uri" xlink:href="https://www.qemu.org">https://www.qemu.org</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>QEMU</collab>
					</person-group>
					<year>2021</year>
					<source>QEMU, the FAST! processor emulator</source>
					<ext-link ext-link-type="uri" xlink:href="https://www.qemu.org">https://www.qemu.org</ext-link>
				</element-citation>
			</ref>
			<ref id="B70">
				<mixed-citation>Ranjith, D., Tamizharasi, G. S., and Balamurugan, B. (2017, April 20-22). <italic>A survey on current trends to future trends in green computing</italic> [Conference presentation]. 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICECA.2017.8203616">https://doi.org/10.1109/ICECA.2017.8203616</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Ranjith</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Tamizharasi</surname>
							<given-names>G. S.</given-names>
						</name>
						<name>
							<surname>Balamurugan</surname>
							<given-names>B.</given-names>
						</name>
					</person-group>
					<year>2017</year>
					<source>A survey on current trends to future trends in green computing</source>
					<conf-date>2017</conf-date>
					<conf-name>International Conference of Electronics</conf-name>
					<conf-sponsor>Communication and Aerospace Technology (ICECA)</conf-sponsor>
					<conf-loc>Coimbatore, India</conf-loc>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICECA.2017.8203616">https://doi.org/10.1109/ICECA.2017.8203616</ext-link>
				</element-citation>
			</ref>
			<ref id="B71">
				<mixed-citation>Ryding, C., and Johansson, R. (2020). <italic>Jails vs Docker: A performance comparison of different container technologies</italic> [Undergraduate thesis, Mid Sweden University]. <ext-link ext-link-type="uri" xlink:href="http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-39517">http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-39517</ext-link>
				</mixed-citation>
				<element-citation publication-type="thesis">
					<person-group person-group-type="author">
						<name>
							<surname>Ryding</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Johansson</surname>
							<given-names>R.</given-names>
						</name>
					</person-group>
					<year>2020</year>
					<source>Jails vs Docker: A performance comparison of different container technologies</source>
					<comment content-type="degree">Undergraduate thesis</comment>
					<publisher-name>Mid Sweden University</publisher-name>
					<ext-link ext-link-type="uri" xlink:href="http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-39517">http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-39517</ext-link>
				</element-citation>
			</ref>
			<ref id="B72">
				<mixed-citation>Sahoo, J., Mohapatra, S., and Lath, R. (2010, April 23-25). <italic>Virtualization: A survey on concepts, taxonomy and associated security issues</italic> [Conference presentation]. 2010 Second International Conference on Computer and Network Technology, Bangkok, Thailand. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICCNT.2010.49">https://doi.org/10.1109/ICCNT.2010.49</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Sahoo</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Mohapatra</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Lath</surname>
							<given-names>R.</given-names>
						</name>
					</person-group>
					<year>2010</year>
					<source>Virtualization: A survey on concepts, taxonomy and associated security issues</source>
					<conf-date>2010</conf-date>
					<conf-name>Second International Conference on Computer and Network Technology</conf-name>
					<conf-loc>Bangkok, Thailand</conf-loc>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICCNT.2010.49">https://doi.org/10.1109/ICCNT.2010.49</ext-link>
				</element-citation>
			</ref>
			<ref id="B73">
				<mixed-citation>Samireh, J., and Claes, W. (2012). <italic>Systematic literature studies: database searches vs. backward snowballing</italic> [Conference presentation]. ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, Lund, Sweden. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/2372251.2 3 722 5 7">https://doi.org/10.1145/2372251.2 3 722 5 7</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Samireh</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Claes</surname>
							<given-names>W.</given-names>
						</name>
					</person-group>
					<year>2012</year>
					<source>Systematic literature studies: database searches vs. backward snowballing</source>
					<conf-name>ACM-IEEE International Symposium on Empirical Software Engineering and Measurement</conf-name>
					<conf-loc>Lund, Sweden</conf-loc>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/2372251.2 3 722 5 7">https://doi.org/10.1145/2372251.2 3 722 5 7</ext-link>
				</element-citation>
			</ref>
			<ref id="B74">
				<mixed-citation>SCOPE Alliance (2008). <italic>Virtualization: State of the art</italic>. <ext-link ext-link-type="uri" xlink:href="https://profsandhu.com/cs6393_s14/SCOPE-Virtualization-Stateof-TheArt-Version-1.0.pdf">https://profsandhu.com/cs6393_s14/SCOPE-Virtualization-Stateof-TheArt-Version-1.0.pdf</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>SCOPE Alliance</collab>
					</person-group>
					<year>2008</year>
					<source>Virtualization: State of the art</source>
					<ext-link ext-link-type="uri" xlink:href="https://profsandhu.com/cs6393_s14/SCOPE-Virtualization-Stateof-TheArt-Version-1.0.pdf">https://profsandhu.com/cs6393_s14/SCOPE-Virtualization-Stateof-TheArt-Version-1.0.pdf</ext-link>
				</element-citation>
			</ref>
			<ref id="B75">
				<mixed-citation>Sehgal, N. K., and Bhatt, P. C. (2018). <italic>Cloud computing</italic>. Springer.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Sehgal</surname>
							<given-names>N. K.</given-names>
						</name>
						<name>
							<surname>Bhatt</surname>
							<given-names>P. C.</given-names>
						</name>
					</person-group>
					<year>2018</year>
					<source>Cloud computing</source>
					<publisher-name>Springer</publisher-name>
				</element-citation>
			</ref>
			<ref id="B76">
				<mixed-citation>Silberschatz, A., Galvin, P. B., and Gagne, G. (2014). <italic>Operating system concepts essentials</italic>. John Wiley &amp; Sons, Inc.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Silberschatz</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Galvin</surname>
							<given-names>P. B.</given-names>
						</name>
						<name>
							<surname>Gagne</surname>
							<given-names>G.</given-names>
						</name>
					</person-group>
					<year>2014</year>
					<source>Operating system concepts essentials</source>
					<publisher-name>John Wiley &amp; Sons, Inc</publisher-name>
				</element-citation>
			</ref>
			<ref id="B77">
				<mixed-citation>Smith, J. E., and Nair, R. (2005). The architecture of virtual machines. <italic>Computer</italic>, 38(5), 32-38. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/MC.2005.173">https://doi.org/10.1109/MC.2005.173</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Smith</surname>
							<given-names>J. E.</given-names>
						</name>
						<name>
							<surname>Nair</surname>
							<given-names>R.</given-names>
						</name>
					</person-group>
					<year>2005</year>
					<article-title>The architecture of virtual machines</article-title>
					<source>Computer</source>
					<volume>38</volume>
					<issue>5</issue>
					<fpage>32</fpage>
					<lpage>38</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/MC.2005.173">https://doi.org/10.1109/MC.2005.173</ext-link>
				</element-citation>
			</ref>
			<ref id="B78">
				<mixed-citation>Stallings, W. (2015). <italic>Operating systems: Internals and design principles</italic> (9<sup>th</sup> ed.). Pearson.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Stallings</surname>
							<given-names>W.</given-names>
						</name>
					</person-group>
					<year>2015</year>
					<source>Operating systems: Internals and design principles</source>
					<edition>9th</edition>
					<publisher-name>Pearson</publisher-name>
				</element-citation>
			</ref>
			<ref id="B79">
				<mixed-citation>Sylabs.io(2022). <italic>Sylabs.io Singularity</italic>. <ext-link ext-link-type="uri" xlink:href="https://www.sylabs.io">https://www.sylabs.io</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Sylabs.io</collab>
					</person-group>
					<year>2022</year>
					<source>Sylabs.io Singularity</source>
					<ext-link ext-link-type="uri" xlink:href="https://www.sylabs.io">https://www.sylabs.io</ext-link>
				</element-citation>
			</ref>
			<ref id="B80">
				<mixed-citation>Syrewicze, A., and Siddaway, R. (2018). <italic>Pro Microsoft Hyper-V 2019: Practical guidance and hands-on labs</italic>. Apress.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Syrewicze</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Siddaway</surname>
							<given-names>R.</given-names>
						</name>
					</person-group>
					<year>2018</year>
					<source>Pro Microsoft Hyper-V 2019: Practical guidance and hands-on labs</source>
					<publisher-name>Apress</publisher-name>
				</element-citation>
			</ref>
			<ref id="B81">
				<mixed-citation>Tfrifonov, D. V., Hristo. (2018). Virtualization and containerization systems for Big Data. <italic>Fundamental Science and Applications</italic>, <italic>24</italic>, 129-132.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Tfrifonov</surname>
							<given-names>D. V.</given-names>
						</name>
						<name>
							<surname>Hristo</surname>
							<given-names/>
						</name>
					</person-group>
					<year>2018</year>
					<article-title>Virtualization and containerization systems for Big Data</article-title>
					<source>Fundamental Science and Applications</source>
					<volume>24</volume>
					<fpage>129</fpage>
					<lpage>132</lpage>
				</element-citation>
			</ref>
			<ref id="B82">
				<mixed-citation>Thai, T. L., and Lam, H. (2003). .<italic>NET framework essentials</italic>. O'Reilly Media, Inc.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Thai</surname>
							<given-names>T. L.</given-names>
						</name>
						<name>
							<surname>Lam</surname>
							<given-names>H.</given-names>
						</name>
					</person-group>
					<year>2003</year>
					<source>NET framework essentials</source>
					<publisher-name>O'Reilly Media, Inc</publisher-name>
				</element-citation>
			</ref>
			<ref id="B83">
				<mixed-citation>Thathera, H., Shashi, H., and Rajput, D. S. (2015). Green computing: An earth friendly system. <italic>International Journal of Science and Research</italic>, 8(4), 25540-25550 <ext-link ext-link-type="uri" xlink:href="https://research.vit.ac.in/ publication/green-computing-an-earth-friendly-system">https://research.vit.ac.in/ publication/green-computing-an-earth-friendly-system</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Thathera</surname>
							<given-names>H.</given-names>
						</name>
						<name>
							<surname>Shashi</surname>
							<given-names>H.</given-names>
						</name>
						<name>
							<surname>Rajput</surname>
							<given-names>D. S.</given-names>
						</name>
					</person-group>
					<year>2015</year>
					<article-title>Green computing: An earth friendly system</article-title>
					<source>International Journal of Science and Research</source>
					<volume>8</volume>
					<issue>4</issue>
					<fpage>25540</fpage>
					<lpage>25550</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://research.vit.ac.in/ publication/green-computing-an-earth-friendly-system">https://research.vit.ac.in/ publication/green-computing-an-earth-friendly-system</ext-link>
				</element-citation>
			</ref>
			<ref id="B84">
				<mixed-citation>User-Mode Linux (2022). <italic>The user-mode Linux Kernel home page</italic>. <ext-link ext-link-type="uri" xlink:href="http://user-mode-linux.sourceforge.net">http://user-mode-linux.sourceforge.net</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>User-Mode Linux</collab>
					</person-group>
					<year>2022</year>
					<source>The user-mode Linux Kernel home page</source>
					<ext-link ext-link-type="uri" xlink:href="http://user-mode-linux.sourceforge.net">http://user-mode-linux.sourceforge.net</ext-link>
				</element-citation>
			</ref>
			<ref id="B85">
				<mixed-citation>Varasteh, A., and Goudarzi, M. (2017). Server consolidation techniques in virtualized data centers: A survey. <italic>IEEE Systems Journal</italic>, 11(2), 772-783. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/JSYST.2015.2458273">https://doi.org/10.1109/JSYST.2015.2458273</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Varasteh</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Goudarzi</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<year>2017</year>
					<article-title>Server consolidation techniques in virtualized data centers: A survey</article-title>
					<source>IEEE Systems Journal</source>
					<volume>11</volume>
					<issue>2</issue>
					<fpage>772</fpage>
					<lpage>783</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/JSYST.2015.2458273">https://doi.org/10.1109/JSYST.2015.2458273</ext-link>
				</element-citation>
			</ref>
			<ref id="B86">
				<mixed-citation>Virtuozzo (2022). <italic>Virtuozzo</italic>. <ext-link ext-link-type="uri" xlink:href="https://www.virtuozzo.com">https://www.virtuozzo.com</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Virtuozzo</collab>
					</person-group>
					<year>2022</year>
					<source>Virtuozzo</source>
					<ext-link ext-link-type="uri" xlink:href="https://www.virtuozzo.com">https://www.virtuozzo.com</ext-link>
				</element-citation>
			</ref>
			<ref id="B87">
				<mixed-citation>VMware (2022). <italic>VMware</italic>. <ext-link ext-link-type="uri" xlink:href="http://www.vmware.com">http://www.vmware.com</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>VMware</collab>
					</person-group>
					<year>2022</year>
					<source>VMware</source>
					<ext-link ext-link-type="uri" xlink:href="http://www.vmware.com">http://www.vmware.com</ext-link>
				</element-citation>
			</ref>
			<ref id="B88">
				<mixed-citation>von Hagen, W. (2008). <italic>Professional Xen virtualization</italic>. John Wiley &amp; Sons, Inc.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>von Hagen</surname>
							<given-names>W.</given-names>
						</name>
					</person-group>
					<year>2008</year>
					<source>Professional Xen virtualization</source>
					<publisher-name>John Wiley &amp; Sons, Inc</publisher-name>
				</element-citation>
			</ref>
			<ref id="B89">
				<mixed-citation>Waldspurger, C. A. (2002). Memory resource management in VMware ESX server. <italic>ACM SIGOPS Operating Systems Review</italic>, 36(SI), 181-194. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/844128.844146">https://doi.org/10.1145/844128.844146</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Waldspurger</surname>
							<given-names>C. A.</given-names>
						</name>
					</person-group>
					<year>2002</year>
					<article-title>Memory resource management in VMware ESX server</article-title>
					<source>ACM SIGOPS Operating Systems Review</source>
					<volume>36</volume>
					<issue>SI</issue>
					<fpage>181</fpage>
					<lpage>194</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/844128.844146">https://doi.org/10.1145/844128.844146</ext-link>
				</element-citation>
			</ref>
			<ref id="B90">
				<mixed-citation>Wessman, N. J., Malatesta, F., Andersson, J., Gomez, P., Mas-mano, M., Nicolau, V., Rhun, J. L., Cabo, G., Bas, F., Lorenzo, R., Sala, O., Trilla, D., and Abella, J. (2021, August 23-27). <italic>De-RISC: The first RISC-V space-grade platform for safety-critical systems</italic> [Conference presentation]. 2021 IEEE Space Computing Conference (SCC), Laurel, MD, USA. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/SCC49971.2021.00010">https://doi.org/10.1109/SCC49971.2021.00010</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Wessman</surname>
							<given-names>N. J.</given-names>
						</name>
						<name>
							<surname>Malatesta</surname>
							<given-names>F.</given-names>
						</name>
						<name>
							<surname>Andersson</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Gomez</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Mas-mano</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Nicolau</surname>
							<given-names>V.</given-names>
						</name>
						<name>
							<surname>Rhun</surname>
							<given-names>J. L.</given-names>
						</name>
						<name>
							<surname>Cabo</surname>
							<given-names>G.</given-names>
						</name>
						<name>
							<surname>Bas</surname>
							<given-names>F.</given-names>
						</name>
						<name>
							<surname>Lorenzo</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Sala</surname>
							<given-names>O.</given-names>
						</name>
						<name>
							<surname>Trilla</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Abella</surname>
							<given-names>J.</given-names>
						</name>
					</person-group>
					<year>2021</year>
					<source>De-RISC: The first RISC-V space-grade platform for safety-critical systems</source>
					<conf-date>2021</conf-date>
					<conf-sponsor>IEEE</conf-sponsor>
					<conf-name>Space Computing Conference (SCC)</conf-name>
					<conf-loc>Laurel, MD, USA</conf-loc>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/SCC49971.2021.00010">https://doi.org/10.1109/SCC49971.2021.00010</ext-link>
				</element-citation>
			</ref>
			<ref id="B91">
				<mixed-citation>Whitaker, A., Shaw, M., and Gribble, S. D. (2002). <italic>Denali: Lightweight virtual machines for distributed and networked applications</italic>. <ext-link ext-link-type="uri" xlink:href="http://web.cs.ucla.edu/~miodrag/cs259-security/whitaker02denali.pdf">http://web.cs.ucla.edu/~miodrag/cs259-security/whitaker02denali.pdf</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Whitaker</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Shaw</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Gribble</surname>
							<given-names>S. D.</given-names>
						</name>
					</person-group>
					<year>2002</year>
					<source>Denali: Lightweight virtual machines for distributed and networked applications</source>
					<ext-link ext-link-type="uri" xlink:href="http://web.cs.ucla.edu/~miodrag/cs259-security/whitaker02denali.pdf">http://web.cs.ucla.edu/~miodrag/cs259-security/whitaker02denali.pdf</ext-link>
				</element-citation>
			</ref>
			<ref id="B92">
				<mixed-citation>White, J., and Pilbeam, A. (2010). A survey of virtualization technologies with performance testing. <italic>arXivpreprint</italic>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.48550/arXiv.1010.3233">https://doi.org/10.48550/arXiv.1010.3233</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>White</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Pilbeam</surname>
							<given-names>A.</given-names>
						</name>
					</person-group>
					<year>2010</year>
					<article-title>A survey of virtualization technologies with performance testing</article-title>
					<source>arXivpreprint</source>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.48550/arXiv.1010.3233">https://doi.org/10.48550/arXiv.1010.3233</ext-link>
				</element-citation>
			</ref>
			<ref id="B93">
				<mixed-citation>Wine (2022). <italic>Wine</italic>. <ext-link ext-link-type="uri" xlink:href="https://www.winehq.org">https://www.winehq.org</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Wine</collab>
					</person-group>
					<year>2022</year>
					<source>Wine</source>
					<ext-link ext-link-type="uri" xlink:href="https://www.winehq.org">https://www.winehq.org</ext-link>
				</element-citation>
			</ref>
			<ref id="B94">
				<mixed-citation>Xen Cambridge (2022). <italic>Xen Cambridge. The virtual machine monitor</italic>. <ext-link ext-link-type="uri" xlink:href="https://www.cl.cam.ac.uk/research/srg/netos/projects/archive/xen/">https://www.cl.cam.ac.uk/research/srg/netos/projects/archive/xen/</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Xen Cambridge</collab>
					</person-group>
					<year>2022</year>
					<source>Xen Cambridge. The virtual machine monitor</source>
					<ext-link ext-link-type="uri" xlink:href="https://www.cl.cam.ac.uk/research/srg/netos/projects/archive/xen/">https://www.cl.cam.ac.uk/research/srg/netos/projects/archive/xen/</ext-link>
				</element-citation>
			</ref>
			<ref id="B95">
				<mixed-citation>Xen Project (2022). <italic>Xen Project Website</italic>. <ext-link ext-link-type="uri" xlink:href="https://www.xenpro-ject.org">https://www.xenpro-ject.org</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Xen Project</collab>
					</person-group>
					<year>2022</year>
					<source>Xen Project Website</source>
					<ext-link ext-link-type="uri" xlink:href="https://www.xenpro-ject.org">https://www.xenpro-ject.org</ext-link>
				</element-citation>
			</ref>
			<ref id="B96">
				<mixed-citation>Xtratum (2022). <italic>Xtratum</italic>. <ext-link ext-link-type="uri" xlink:href="http://www.xtratum.org">http://www.xtratum.org</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Xtratum</collab>
					</person-group>
					<year>2022</year>
					<source>Xtratum</source>
					<ext-link ext-link-type="uri" xlink:href="http://www.xtratum.org">http://www.xtratum.org</ext-link>
				</element-citation>
			</ref>
			<ref id="B97">
				<mixed-citation>Yee, B., Sehr, D., Dardyk, G., Chen, J. B., Muth, R., Ormandy, T., Okasaka, S., Narula, N., and Fullagar, N. (2009). <italic>Native client: A sandbox for portable, untrusted x86 native code</italic> [Conference presentation]. 2009 30th IEEE Symposium on Security and Privacy, Oakland, CA, USA. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/SP.2009.25">https://doi.org/10.1109/SP.2009.25</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Yee</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Sehr</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Dardyk</surname>
							<given-names>G.</given-names>
						</name>
						<name>
							<surname>Chen</surname>
							<given-names>J. B.</given-names>
						</name>
						<name>
							<surname>Muth</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Ormandy</surname>
							<given-names>T.</given-names>
						</name>
						<name>
							<surname>Okasaka</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Narula</surname>
							<given-names>N.</given-names>
						</name>
						<name>
							<surname>Fullagar</surname>
							<given-names>N.</given-names>
						</name>
					</person-group>
					<year>2009</year>
					<source>Native client: A sandbox for portable, untrusted x86 native code</source>
					<conf-date>2009</conf-date>
					<conf-sponsor>IEEE</conf-sponsor>
					<conf-name>30thSymposium on Security and Privacy</conf-name>
					<conf-loc>Oakland, CA, USA</conf-loc>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/SP.2009.25">https://doi.org/10.1109/SP.2009.25</ext-link>
				</element-citation>
			</ref>
		</ref-list>
		<fn-group>
			<fn fn-type="other" id="fn1">
				<label>How to cite:</label>
				<p> Sepúlveda-Rodríguez, L. E., Chavarro-Porras, J. C., Sanabria-Ordóñez, J. A., Castro, H., Matthews, J. ( (2022). A Survey of Virtualization Technologies: Towards a New Taxonomic Proposal. <italic>Ingeniería e Investigación, 42(3),</italic> e97363. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.15446/ing.investig.97363">https://doi.org/10.15446/ing.investig.97363</ext-link>
				</p>
			</fn>
		</fn-group>
	</back>
</article>